Headline
CVE-2021-46078: GitHub - plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Stored-Cross-Site-Scripting: Vehicle Service Management System - 'Multiple' File upload Leads to Stored Cross-Site Scrip
An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to a Stored Cross-Site Scripting vulnerability.
Vehicle Service Management System - ‘Multiple’ File upload Leads to Stored Cross-Site Scripting
Vehicle Service Management System - ‘Multiple’ File upload Leads to Stored Cross-Site Scripting
Exploit Title: Vehicle Service Management System - ‘Multiple’ File upload Leads to Stored Cross-Site Scripting****Date: 29/12/2021****Exploit Author: P.L.Sanu****Exploit Author Website: https://www.plsanu.com****Vendor Homepage: https://www.sourcecodester.com****Software Link: https://www.sourcecodester.com/php/14972/vehicle-service-management-system-php-free-source-code.html****Version: <= 1.0****Tested on: Windows 10****CVE :****Google Dork: N/A****Reference:
- https://www.plsanu.com/vehicle-service-management-system-multiple-file-upload-leads-to-stored-cross-site-scripting
- https://github.com/plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Stored-Cross-Site-Scripting
1. Vehicle Service Management System - ‘MyAccount’ (/admin/?page=user)****Steps to Reproduce:
- Login to the admin panel http://localhost/vehicle_service/admin
- Navigate to My Account section http://localhost/vehicle_service/admin/?page=user
Code:
<!DOCTYPE html> <html> <title>Stored XSS</title> <body> <script> alert(document.cookie); </script> </body> </html>
- Save the above html code For Ex:XSS.html
- In My Account Section enter all the required details and browse the html file in Avatar.
- Click on update button.
- Open the avatar image in new tab.
- Malicious javascript code triggered.
2. Vehicle Service Management System - ‘User List’ (/admin/?page=user/manage_user)****Steps to Reproduce:
- Login to the admin panel http://localhost/vehicle_service/admin
- Navigate to User List section and click on Create New button.
Code:
<!DOCTYPE html> <html> <title>Stored XSS</title> <body> <script> alert(document.cookie); </script> </body> </html>
- Save the above html code For Ex:XSS.html
- In Create New User Page enter all the required details and browse the html file in Avatar.
- Click on Save button.
- Open the avatar image in new tab.
- Malicious javascript code triggered.
3. Vehicle Service Management System - ‘Settings-System Logo’ (/admin/?page=system_info)****Steps to Reproduce:
- Login to the admin panel http://localhost/vehicle_service/admin
- Navigate to Settings section http://localhost/vehicle_service/admin/?page=system_info
Code:
<!DOCTYPE html> <html> <title>Stored XSS</title> <body> <script> alert(document.cookie); </script> </body> </html>
- Save the above html code For Ex:XSS.html
- In Settings Section enter all the required details and browse the html file in System Logo.
- Click on update button.
- Open the System Logo image in new tab.
- Malicious javascript code triggered.
4. Vehicle Service Management System - ‘Settings-Website Cover’ (/admin/?page=system_info)****Steps to Reproduce:
- Login to the admin panel http://localhost/vehicle_service/admin
- Navigate to Settings section http://localhost/vehicle_service/admin/?page=system_info
Code:
<!DOCTYPE html> <html> <title>Stored XSS</title> <body> <script> alert(document.cookie); </script> </body> </html>
- Save the above html code For Ex:XSS.html
- In Settings Section enter all the required details and browse the html file in Website Cover.
- Click on update button.
- Open the Website Cover image in new tab.
- Malicious javascript code triggered.