[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAEudmYGxAnEwDsbRFXD+ixJ+kgfprSNLd8Pg4wYptTswcoJKsw@mail.gmail.com>
Date: Tue, 8 Dec 2020 10:07:53 +0530
From: krishna yadav <kisna1993yadav@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] Request for full disclosure of CVE-2020-25889 & CVE-2020-25955
Dear Team,
Please find attached POC and detailed information for CVE-2020-25889 &
CVE-2020-25955.
For CVE-2020-25889:
# Exploit Title: online bus booking system project using PHP MySQL - SQL
Injection
# Exploit Author: Krishna Yadav
# Vendor Homepage: https://www.sourcecodester.com
# Software Link:
https://www.sourcecodester.com/php/14438/online-bus-booking-system-project-using-phpmysql.html
# Version: 1.0
# Tested on Windows 10/Kali Linux
SQL Injection:
SQL Injection (SQLi) is a type of injection attack that makes it possible
to execute malicious SQL statements. These statements control a database
server behind a web application. Attackers can use SQL Injection
vulnerabilities to bypass application security measures. They can go around
authentication and authorization of a web page or web application and
retrieve the content of the entire SQL database. They can also use SQL
Injection to add, modify, and delete records in the database.
Attack Vector:
online-bus-booking-system-project-using-PHP-MySQL version 1.0 has SQL
injection at the login page. By placing SQL injection payload on the login
page attacker can bypass the authentication and can gain the admin
privilege.
Vulnerable Parameter: Login Page
==========================================================================================================================================
For CVE-2020-25955
# Exploit Title: student management system project PHP - Stored cross-site
scripting
# Exploit Author: Krishna Yadav
# Vendor Homepage: https://www.sourcecodester.com
# Software Link:
https://www.sourcecodester.com/php/14443/student-management-system-project-php.html
# Version: 1.0
# Tested on Windows 10/Kali Linux
Stored cross-site scripting:
Stored attacks are those where the injected script is permanently stored on
the target servers, such as in a database, in a message forum, visitor log,
comment field, etc. The victim then retrieves the malicious script from the
server when it requests the stored information. Stored XSS is also
sometimes referred to as Persistent or Type-I XSS.
Attack Vector:
student management system project version 1.0 is vulnerable to stored XSS.
Each time while editing the subjects XSS popup will reflect.
Vulnerable Parameter: Add subject tab is vulnerable to stored XSS.
NOTE: For better understanding, please look at the attached POCs for both
CVE IDs.
Kindly publish the details ASAP.
Thanks & Regards,
Krishna Yadav
Mob No. +91 8169434641
Download attachment "POC-for-CVE-2020-25889.mp4" of type "video/mp4" (1921988 bytes)
Download attachment "POC for CVE-2020-25955.zip" of type "application/zip" (89396 bytes)
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists