Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-42663 PoC — Engineers Online Portal 跨站脚本漏洞

Source
Associated Vulnerability
Title:Engineers Online Portal 跨站脚本漏洞 (CVE-2021-42663)
Description:Engineers Online Portal是开源的一个在线门户。是使用PHP、MySQL 数据库、HTML、CSS、Javascript、jQuery、Ajax、Bootstrap 和一些其他库开发的。 Engineers Online Portal 存在跨站脚本漏洞,该漏洞源于PHP MySQL中的Sourcecodester Online Event Booking and Reservation System存在一个HTML注入漏洞,通过msg参数到Event -management index
Description
CVE-2021-42663 - HTML Injection vulnerability in the Online event booking and reservation system. 
Readme
# CVE-2021-42663
CVE-2021-42662 - HTML Injection vulnerability in the Online event booking and reservation system version 2.3.0. 

# Technical description:
A HTML injection vulnerability exists in the Online Event Booking and Reservation System version 2.3.0. An attacker can leverage this vulnerability in order to change the visibility of the website. Once the target user clicks on a given link he will display the content of the HTML code of the attacker's choice.

Affected components - 

Vulnerable page - index.php

Vulnerable parameter - "msg"

# Steps to exploit:
1) Navigate to http://localhost/event-management/views/index.php
2) Insert your payload in the "msg" parameter through the URL
3) Send the complete link to the victim


# Proof of concept (Poc) -
The following payload will allow you to run the HTML code - 
```
<h1>This is an HTML injection</h1>
```

![CVE-2021-42663](https://user-images.githubusercontent.com/93016131/140179296-b2fbb220-94a7-4f97-aae9-7ad63755f95b.gif)

# References - 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42663

https://nvd.nist.gov/vuln/detail/CVE-2021-42663

# Discovered by -
Alon Leviev(0xDeku), 22 October, 2021. 
File Snapshot

[4.0K] /data/pocs/648c8e121b9bd9cf852071379687dc306bd69375 └── [1.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.