HTB22757 & HTB22758
The vulnerability exists due to failure in the 'admin/editAdmin.php' script to properly verify the source of HTTP request. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. Attacker can use browser to exploit this vulnerability. The following PoC is available: <form action='http://host/admin/editAdmin/USER_ID' method='post' name='main'><input type='hidden' name='lv' value='3'><input type='hidden' name='+' value='on'></form><script>document.main.submit();</script>. User can execute arbitrary JavaScript code within the vulnerable application. The vulnerability exists due to failure in the 'admin/editGroup.php' script to properly sanitize user-supplied input in 'dsc' variable. Successful expoitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. Attacker can use browser to exploit this vulnerability. The following PoC is available: http://host/admin/editGroup.php?id=1&dsc=<script>alert(document.cookie)</script>