目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1020

100%

CVE-2021-42662 PoC — Engineers Online Portal 跨站脚本漏洞

来源
关联漏洞
标题:Engineers Online Portal 跨站脚本漏洞 (CVE-2021-42662)
Description:Engineers Online Portal是开源的一个在线门户。是使用PHP、MySQL 数据库、HTML、CSS、Javascript、jQuery、Ajax、Bootstrap 和一些其他库开发的。 Engineers Online Portal 存在跨站脚本漏洞,该漏洞源于PHP MySQL中的Sourcecodester在线事件预订和预订系统通过Holiday reason参数存在一个存储跨站脚本(XSS)漏洞。攻击者可利用该漏洞在web服务器上运行javascript命令,这可能导致窃取co
Description
CVE-2021-42662 - Stored Cross-Site Scripting vulnerability in the Online event booking and reservation system. 
介绍
# CVE-2021-42662
CVE-2021-42662 - Stored Cross-Site Scripting vulnerability in the Online event booking and reservation system version 2.3.0. 

# Technical description:
A stored XSS vulnerability exists in the Event management software version 2.3.0. An attacker can leverage this vulnerability in order to run javascript on the web server surfers behalf, which can lead to cookie stealing, defacement and more. 

Affected components - 

Vulnerable page - HOLY

Vulnerable parameter - "reason"

# Steps to exploit:
1) Navigate to http://localhost/event-management/views/?v=HOLY
2) Insert your payload in the "reason" parameter
3) Click "Add holiday"

# Proof of concept (Poc) -
The following payload will allow you to run the javascript code - 
```
<script>alert("This is an XSS")</alert>
```

![CVE-2021-42662](https://user-images.githubusercontent.com/93016131/140184846-6b92b6c9-74fd-4ba0-816b-75e9218db2e3.gif)

# References - 
https://www.exploit-db.com/exploits/50450

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42662

https://nvd.nist.gov/vuln/detail/CVE-2021-42662


# Discovered by - 
Alon Leviev(0xDeku), 22 October, 2021. 

文件快照

[4.0K] /data/pocs/2368b8bd54c9bc809ca386fbe26db10a1c95707d └── [1.1K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
    3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →