Edit Report

Our sensors found this exploit at:

Below is a copy:

Web-Based Student Clearance System - XXE Injection
# Title: Web-Based Student Clearance System - XXE Injection
# Author: @Eawhitehat - Eren Arslan
# Demo available :
# CVE: N/A
# Screenshot :

Used Payload :
<?xml version="1.0" encoding="ISO-8859-1"?>

Admin account : 

Method :
Connect to panel : http://localhost/admin/login.php

1. After login with admin account, go to http://localhost/admin/student-record.php (Student Management > Register Student)
2. Add the payload : <?xml version="1.0" encoding="ISO-8859-1"?> in "FullName" , "Matric No." , "Phone No."
3. Enter random information in the other fields to validate
4. Check the code source, your XXE injected 

Enjoy !

Copyright ©2023 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.