Submit #48128: Human Resource Management System v1.0 - Privledge Escalationالمعلومات

TitleHuman Resource Management System v1.0 - Privledge Escalation
Description# Exploit Title: Human Resource Management System v1.0 - Vertical Privilege Escalation # Exploit Author: Krutika Thakur # Vendor Name: oretnom23 # Vendor Homepage: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html # Software Link: https://www.sourcecodester.com/php/15740/human-resource-management-system-project-php-and-mysql-free-source-code.html # Version: v1.0 # Tested on: Parrot GNU/Linux 4.10, Apache Description:- A Vertical Privilege Escalation issue in Human Resource Management System v1.0 allows an attacker to get access into admin account without having any privilege. ` Payload: /employeeadd.php ` Parameter:- http://localhost/hrm/employeeadd.php ` Steps to reproduce:- 1. First login as normal user 2. We have got the above url as: http://localhost/hrm/user/home.php 3. Now lets add one more directory: /employeeadd.php and remove the /user/home.php 4. As we can see now got the admin access and we can make changes in admin panel 5. We can even change the admin password
Userlucifoxer001 (ID 33693)
Submission13/10/2022 18:05 (2 years ago)
Moderation13/10/2022 19:26 (1 hour later)
Accepted
تمت الموافقة
VulDB EntryVDB-210785

Interested in the pricing of exploits?

See the underground prices here!