exploit-db-mirror/exploits/php/webapps/50050.txt
Offensive Security d318d8a2c7 DB: 2021-06-23
4 changes to exploits/shellcodes

ASUS DisplayWidget Software 3.4.0.036 - 'ASUSDisplayWidgetService' Unquoted Service Path
Responsive Tourism Website 3.1 - Remote Code Execution (RCE) (Unauthenticated)
Phone Shop Sales Managements System 1.0 - Insecure Direct Object Reference (IDOR)
2021-06-23 05:01:58 +00:00

25 lines
No EOL
700 B
Text

# Exploit Title: Phone Shop Sales Managements System 1.0 - Insecure Direct Object Reference (IDOR)
# Date: 21/06/2021
# Exploit Author: Pratik Khalane
# Vendor Homepage: https://www.sourcecodester.com/
# Software Link: https://www.sourcecodester.com/php/10882/phone-shop-sales-managements-system.html
# Version: 1.0
# Tested on: Windows 10 Pro
Vulnerability Details
======================
Steps :
1) Log in to the application with the given credentials
Username: kwizera
Password: 12345
2) Navigate to Invoice and Click on Print Invoice.
3)In /Invoice.php?id=3005, modify the id Parameter to View User details,
Address,
Payments, Phone number, and Email of other Users