POC详情: 484ac3b0c0b75e6351583ecf3c100e458f9a76fd

来源
关联漏洞
标题: CampCodes Online Movie Theater Seat Reservation System 代码注入漏洞 (CVE-2025-7840)
描述:CampCodes Online Movie Theater Seat Reservation System是菲律宾CampCodes公司的一个在线影院座位预订系统。 Campcodes Online Movie Theater Seat Reservation System 1.0版本存在代码注入漏洞,该漏洞源于文件/index.php中参数Firstname/Lastname处理不当导致跨站脚本。
描述
Proof‑of‑concept exploit for CVE‑2025‑7840 that injects malicious payloads into the Firstname parameter of a reservation form to trigger XSS
介绍
# XSS Exploit for CVE-2025-7840

**Author**: Byte Reaper (@ByteReaper0)

## Description

Proof‑of‑concept exploit for **CVE-2025-7840**, targeting a vulnerable web application endpoint that fails to sanitize user input on the `Firstname` parameter of a reservation form. By crafting a GET request to:

```
/index.php?page=reserve&Firstname=<payload>&Lastname=test
```

an attacker can inject and execute arbitrary JavaScript in the victim’s browser when the response is rendered.

## Features

* Inject custom payloads with `-b` option
* Handle cookie-based sessions via `-c` option
* Verbose logging for request/response analysis (`-v`)
* Built-in set of common XSS payloads

## Requirements

* Linux or macOS
* GCC (or compatible C compiler)
* `libcurl` development headers
* `argparse` library for C

## Installation

1. Compile the exploit:

   ```
   gcc -o exploit exploit.c argparse.c -lcurl 
   ```

## Usage

```
sudo ./exploit -u <TARGET_URL> [options]
```

### Options

| Flag         | Description                                  |
| ------------ | -------------------------------------------- |
| `-u` URL     | Target base URL (e.g. `http://victim.local`) |
| `-b` PAYLOAD | Custom XSS payload to inject                 |
| `-c` FILE    | Cookie jar file to use for session handling  |
| `-v`         | Verbose mode (show request/response details) |

### Examples

* Run default payloads against a target:

  ```
  sudo ./exploit -u http://victim.local
  ```

* Use a custom payload:

  ```
  sudo ./exploit -u http://victim.local -b "<script>alert(\'PWNED\')</script>"
  ```

* Include session cookies and verbose output:

  ```
  sudo ./exploit -u http://victim.local -c cookies.txt -v
  ```

## Disclaimer

This code is provided for educational and testing purposes only. Unauthorized use against systems you do not own or have explicit permission to test is illegal and unethical.

## References

* CVE-2025-7840: XSS in reservation form
* Author Telegram: @ByteReaper0
## LICENSE:
MIT 
文件快照

[4.0K] /data/pocs/484ac3b0c0b75e6351583ecf3c100e458f9a76fd ├── [ 16K] exploit.c ├── [1.0K] LICENSE └── [2.0K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。