Full Disclosure mailing list archives

Request for full disclosure of CVE-2020-25889 & CVE-2020-25955


From: krishna yadav <kisna1993yadav () gmail com>
Date: Tue, 8 Dec 2020 10:07:53 +0530

Dear Team,

Please find attached POC and detailed information for CVE-2020-25889 &
CVE-2020-25955.

For CVE-2020-25889:
# Exploit Title: online bus booking system project using PHP MySQL - SQL
Injection
# Exploit Author: Krishna Yadav
# Vendor Homepage: https://www.sourcecodester.com
# Software Link:
https://www.sourcecodester.com/php/14438/online-bus-booking-system-project-using-phpmysql.html
# Version: 1.0
# Tested on Windows 10/Kali Linux

SQL Injection:
SQL Injection (SQLi) is a type of injection attack that makes it possible
to execute malicious SQL statements. These statements control a database
server behind a web application. Attackers can use SQL Injection
vulnerabilities to bypass application security measures. They can go around
authentication and authorization of a web page or web application and
retrieve the content of the entire SQL database. They can also use SQL
Injection to add, modify, and delete records in the database.

Attack Vector:
online-bus-booking-system-project-using-PHP-MySQL version 1.0 has SQL
injection at the login page. By placing SQL injection payload on the login
page attacker can bypass the authentication and can gain the admin
privilege.

Vulnerable Parameter: Login Page

==========================================================================================================================================

 For CVE-2020-25955
# Exploit Title: student management system project PHP - Stored cross-site
scripting
# Exploit Author: Krishna Yadav
# Vendor Homepage: https://www.sourcecodester.com
# Software Link:
https://www.sourcecodester.com/php/14443/student-management-system-project-php.html
# Version: 1.0
# Tested on Windows 10/Kali Linux

Stored cross-site scripting:
Stored attacks are those where the injected script is permanently stored on
the target servers, such as in a database, in a message forum, visitor log,
comment field, etc. The victim then retrieves the malicious script from the
server when it requests the stored information. Stored XSS is also
sometimes referred to as Persistent or Type-I XSS.

Attack Vector:
student management system project version 1.0 is vulnerable to stored XSS.
Each time while editing the subjects XSS popup will reflect.

Vulnerable Parameter: Add subject tab is vulnerable to stored XSS.

NOTE: For better understanding, please look at the attached POCs for both
CVE IDs.

Kindly publish the details ASAP.

Thanks & Regards,
Krishna Yadav
Mob No. +91 8169434641

Attachment: POC-for-CVE-2020-25889.mp4
Description:

Attachment: POC for CVE-2020-25955.zip
Description:


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Current thread: