Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-42664 PoC — Engineers Online Portal 跨站脚本漏洞

Source
Associated Vulnerability
Title:Engineers Online Portal 跨站脚本漏洞 (CVE-2021-42664)
Description:Engineers Online Portal是开源的一个在线门户。是使用PHP、MySQL 数据库、HTML、CSS、Javascript、jQuery、Ajax、Bootstrap 和一些其他库开发的。 Engineers Online Portal 存在跨站脚本漏洞,该漏洞源于通过 add_quiz.php 的 (1) 测验标题和 (2) 测验描述参数,PHP 中的 Sourcecodester 工程师在线门户中存在存储跨站点脚本 (XSS) 漏洞。攻击者可利用该漏洞在web服务器上运行javasc
Description
 CVE-2021-42664 - Stored Cross-Site Scripting vulnerability in the Engineers online portal system.
Readme
# CVE-2021-42664
CVE-2021-42664 - Stored Cross-Site Scripting vulnerability in the Engineers online portal system. 

# Technical description:
A stored XSS vulnerability exists in the Engineers online portal system. An attacker can leverage this vulnerability in order to run javascript on the web server surfers behalf, which can lead to cookie stealing, defacement and more. 

Affected components -  

Vulnerable page - add_quiz.php

Vulnerable parameters - "quiz_title", "description"

# Steps to exploit:
1) Navigate to http://localhost/nia_munoz_monitoring_system/add_quiz.php
2) Insert your payload in the "quiz_title" parameter or the "description" parameter
3) Click save

# Proof of concept (Poc) -
The following payload will allow you to run the javascript code - 
```
<script>alert("This is an XSS")</script>
```

![CVE-2021-42664](https://user-images.githubusercontent.com/93016131/140181371-4ebb424b-a550-40c7-843a-9cbeacd9bb34.gif)

# References -
https://www.exploit-db.com/exploits/50451

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42664

https://nvd.nist.gov/vuln/detail/CVE-2021-42664

# Discovered by - 
Alon Leviev(0xDeku), 22 October, 2021. 
File Snapshot

[4.0K] /data/pocs/d1e04fe5950f6cbc4faaf6bc2c352f1c23eda529 └── [1.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.