Advertisement






Virtual Airlines Manager 2.6.2 Persistent Cross-Site Scripting

CVE Category Price Severity
CVE-2020-24021 CWE-79 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2020-07-27
CPE
cpe:cpe:/a:virtual_airlines_manager:2.6.2
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020070137

Below is a copy:

Virtual Airlines Manager 2.6.2 Persistent Cross-Site Scripting
# Exploit Title: Virtual Airlines Manager 2.6.2 - Persistent Cross-Site Scripting
# Google Dork:  inurl:"/vam/index_vam_op.php"
# Date: 2020-06-29
# Exploit Author: Peter Blue
# Vendor Homepage: https://virtualairlinesmanager.net
# Software Link: https://virtualairlinesmanager.net
# Version: 2.6.2
# Tested on: Linux (Fedora 23), MariaDB, PHP 5.6.29, Apache
# CVE: N/A


This project looks nice but lacks a lot of input filtering.

This example allows a logged-in user to inject JavaScript code, and this
case steal a session ID, but other exploits could be injected.

This exploit example assumes you have installed VAM 2.6.2 on a local server.

Steps :-

1. Log on. There is an admin account: Callsign: vam100, Password: 123456

2. Click "Pilot Actions"

3. Click "Internal Mail"

4. Click New Message

5. In "Subject" enter XSS <script>alert(document.cookie);//<</script>

6. in "Message" type anything

7. Click "Send"

8. When the page refreshes your PHP session ID will show in an alert box

It is also quite possible to inject raw HTML into the subject.

A bit of Google Dorking revealed many websites running this, some were
dead, some deserted and a few were live.

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum