Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-51032 PoC — Toll Tax Management System 安全漏洞

Source
Associated Vulnerability
Title:Toll Tax Management System 安全漏洞 (CVE-2024-51032)
Description:A Cross-site Scripting (XSS) vulnerability in manage_recipient.php of Sourcecodester Toll Tax Management System 1.0 allows remote authenticated users to inject arbitrary web scripts via the "owner" input field.
Description
A Cross-site Scripting (XSS) vulnerability in manage_recipient.php of Sourcecodester Toll Tax Management System 1.0 allows remote authenticated users to inject arbitrary web scripts via the "owner" input field.
Readme
# CVE-2024-51032

## Description
A Cross-site Scripting (XSS) vulnerability in manage_recipient.php of Sourcecodester Toll Tax Management System 1.0 allows remote authenticated users to inject arbitrary web scripts via the "owner" input field.

## Vulnerability Type
Cross Site Scripting (XSS)

## Vendor of Product
Sourcecodester

## Affected Product Code Base:
https://www.sourcecodester.com/php/15304/toll-tax-management-system-phpoop-free-source-code.html - 1.0

## Affected Component:
Cross Site Scripting (XSS) vulnerability in sourcecodester Toll Tax Management System 1.0 allows remote attackers to run arbitrary code via the owner input field on the manage_recipient page

## Attack Vectors:
1. Setup the application locally and login using the default admin credentials.
2. Then go to "user list" option and you will see a normal user named cblake. Click on the action tab and click on edit and generate a password for the cblake user so you can login as cblake.
3. Then logout and then log back in as user cblake with the required credentials.
4. Now go to "recipients" field and click on create new button.
5. Now inject the paylaod `"<svg onload=alert&#0000000040document.cookie)>"` in the owner input field and complete the remaining form details and click the "save" button.
6. Now log back in as admin and go to recipients tab, you can see the entry which cblake did and we can also see an alert popping up which prints the session cookie of  "admin" user.


## Reference:
https://www.sourcecodester.com/
https://www.sourcecodester.com/php/15304/toll-tax-management-system-phpoop-free-source-code.html
https://owasp.org/www-community/attacks/xss/
File Snapshot

[4.0K] /data/pocs/71371a99707f0403e555c0ed9c2adb80c7eaa954 └── [1.6K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →