Hi All,
I am Maloy Roy Orko.
Recently in one of my pentest research, I found a Library-Card-System application By Needyamin which is an open source Library-Card-System to print a library card with student information using PHP, MYSQL, JAVASCRIPT.
It is based on the scripting languages of PHP. Library-Card-System is a Library-Card-System using PHP, MYSQL, JAVASCRIPT
Curious to explore its functionalities, I downloaded and set it up in my local system.
After fiddling with the source code, I found that it did not have any kind of XSS Protection in signup.php file.
It can lead into:
- Malware Distribution
- Admin & User Account Takeover
- Data Breach
- Users Into Risk
- Reputation Damage
The Main Thing Is,If any NON-IT personal uses this template,he will fall into this vulnerability and his companies reputation can be lost too.Thats why I am trying to inform everyone about this.
- Title of the Vulnerability:
- Library-Card-System | Stored Cross Site Scripting In signup.php | Found By Maloy Roy Orko
- Vulnerability Class: Stored Cross Site Scripting
- Product Name: Library-Card-System
- Vendor: https://github.com/needyamin/
- Vulnerable Product Link: https://github.com/needyamin/Library-Card-System/
- Technical Details & Description: The application source code is coded in a way which allows Stored Cross Site Scripting .It can lead into:
- Malware Distribution
- Data Breach
- Denial of Service (DoS)
- Web Shell Installation
- Reputation Damage
- Product & Service Introduction: Library-Card-System
- Observation & Exploitation:
- /admindashboard.php/
- /card.php?id=valid id/
Lets Exploit 🌠🗝️🔐:
- First,Go To signup.php
- Example: 192.168.0.100:8080/libb/signup.php
- Now,Use XSS Payloads To Signup In The Sign Up Fields.
- Here,I Am Inputing XSS PAYLOADS IN First Name & Book Name Field.
- The Payloads Are Inputted Like This:
- See The Image
- First Name: Ovro<script>alert("XSS Found By Maloy");</script>
- Book Name: Book<script>alert("xss");</script>Nil
- We will be able to Takeover Admin As XSS Payloads Direct Gives Impact On /admindashboard.php
Conclusion :-
The main aim of this article is to show that if any NON-IT personal uses this template,he will fall into this vulnerability and his companies reputation can be lost too. But I also hope that it helps to give you ideas of how combi
ning attacks can make them much more potent.