Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-42662 PoC — Engineers Online Portal 跨站脚本漏洞

Source
Associated Vulnerability
Title:Engineers Online Portal 跨站脚本漏洞 (CVE-2021-42662)
Description:Engineers Online Portal是开源的一个在线门户。是使用PHP、MySQL 数据库、HTML、CSS、Javascript、jQuery、Ajax、Bootstrap 和一些其他库开发的。 Engineers Online Portal 存在跨站脚本漏洞,该漏洞源于PHP MySQL中的Sourcecodester在线事件预订和预订系统通过Holiday reason参数存在一个存储跨站脚本(XSS)漏洞。攻击者可利用该漏洞在web服务器上运行javascript命令,这可能导致窃取co
Description
CVE-2021-42662 - Stored Cross-Site Scripting vulnerability in the Online event booking and reservation system. 
Readme
# CVE-2021-42662
CVE-2021-42662 - Stored Cross-Site Scripting vulnerability in the Online event booking and reservation system version 2.3.0. 

# Technical description:
A stored XSS vulnerability exists in the Event management software version 2.3.0. An attacker can leverage this vulnerability in order to run javascript on the web server surfers behalf, which can lead to cookie stealing, defacement and more. 

Affected components - 

Vulnerable page - HOLY

Vulnerable parameter - "reason"

# Steps to exploit:
1) Navigate to http://localhost/event-management/views/?v=HOLY
2) Insert your payload in the "reason" parameter
3) Click "Add holiday"

# Proof of concept (Poc) -
The following payload will allow you to run the javascript code - 
```
<script>alert("This is an XSS")</alert>
```

![CVE-2021-42662](https://user-images.githubusercontent.com/93016131/140184846-6b92b6c9-74fd-4ba0-816b-75e9218db2e3.gif)

# References - 
https://www.exploit-db.com/exploits/50450

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42662

https://nvd.nist.gov/vuln/detail/CVE-2021-42662


# Discovered by - 
Alon Leviev(0xDeku), 22 October, 2021. 

File Snapshot

[4.0K] /data/pocs/2368b8bd54c9bc809ca386fbe26db10a1c95707d └── [1.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.