Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-46078: GitHub - plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Stored-Cross-Site-Scripting: Vehicle Service Management System - 'Multiple' File upload Leads to Stored Cross-Site Scrip

An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to a Stored Cross-Site Scripting vulnerability.

CVE
#xss#vulnerability#web#windows#google#git#java

Vehicle Service Management System - ‘Multiple’ File upload Leads to Stored Cross-Site Scripting

Vehicle Service Management System - ‘Multiple’ File upload Leads to Stored Cross-Site Scripting

Exploit Title: Vehicle Service Management System - ‘Multiple’ File upload Leads to Stored Cross-Site Scripting****Date: 29/12/2021****Exploit Author: P.L.Sanu****Exploit Author Website: https://www.plsanu.com****Vendor Homepage: https://www.sourcecodester.com****Software Link: https://www.sourcecodester.com/php/14972/vehicle-service-management-system-php-free-source-code.html****Version: <= 1.0****Tested on: Windows 10****CVE :****Google Dork: N/A****Reference:

  • https://www.plsanu.com/vehicle-service-management-system-multiple-file-upload-leads-to-stored-cross-site-scripting
  • https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Stored-Cross-Site-Scripting

1. Vehicle Service Management System - ‘MyAccount’ (/admin/?page=user)****Steps to Reproduce:

  1. Login to the admin panel http://localhost/vehicle_service/admin
  2. Navigate to My Account section http://localhost/vehicle_service/admin/?page=user

Code:

<!DOCTYPE html> <html> <title>Stored XSS</title> <body> <script> alert(document.cookie); </script> </body> </html>

  1. Save the above html code For Ex:XSS.html
  2. In My Account Section enter all the required details and browse the html file in Avatar.
  3. Click on update button.
  4. Open the avatar image in new tab.
  5. Malicious javascript code triggered.

2. Vehicle Service Management System - ‘User List’ (/admin/?page=user/manage_user)****Steps to Reproduce:

  1. Login to the admin panel http://localhost/vehicle_service/admin
  2. Navigate to User List section and click on Create New button.

Code:

<!DOCTYPE html> <html> <title>Stored XSS</title> <body> <script> alert(document.cookie); </script> </body> </html>

  1. Save the above html code For Ex:XSS.html
  2. In Create New User Page enter all the required details and browse the html file in Avatar.
  3. Click on Save button.
  4. Open the avatar image in new tab.
  5. Malicious javascript code triggered.

3. Vehicle Service Management System - ‘Settings-System Logo’ (/admin/?page=system_info)****Steps to Reproduce:

  1. Login to the admin panel http://localhost/vehicle_service/admin
  2. Navigate to Settings section http://localhost/vehicle_service/admin/?page=system_info

Code:

<!DOCTYPE html> <html> <title>Stored XSS</title> <body> <script> alert(document.cookie); </script> </body> </html>

  1. Save the above html code For Ex:XSS.html
  2. In Settings Section enter all the required details and browse the html file in System Logo.
  3. Click on update button.
  4. Open the System Logo image in new tab.
  5. Malicious javascript code triggered.

4. Vehicle Service Management System - ‘Settings-Website Cover’ (/admin/?page=system_info)****Steps to Reproduce:

  1. Login to the admin panel http://localhost/vehicle_service/admin
  2. Navigate to Settings section http://localhost/vehicle_service/admin/?page=system_info

Code:

<!DOCTYPE html> <html> <title>Stored XSS</title> <body> <script> alert(document.cookie); </script> </body> </html>

  1. Save the above html code For Ex:XSS.html
  2. In Settings Section enter all the required details and browse the html file in Website Cover.
  3. Click on update button.
  4. Open the Website Cover image in new tab.
  5. Malicious javascript code triggered.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907