kai-iszz / CVE-2023-30212

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2023-30212

Exploiting vulnerability in Ourphp version 7.2.0 also called CVE 2023 30212

Step 1. Download and install Docker in your system (Note). I am using Docker because it’s quick and easy to install ubuntu.

Step 2. Setup Docker environment

docker pull ubuntu
docker run -d -t –name test-container -p 80:80 -p 443:44
3 -p 3306:3306 -p 21:21 ubuntu
Docker exec -it test-container bash

Step 3. Install web server, php & mysql. I will be installing xampp server for this.

wget https://liquidtelecom.dl.sourceforge.net/project/xampp/XAMPP%20Linux/7.2.0/xampp-linux-x64-7.2.0-0-installer.run 
chmod +x xampp-linux-x64-7.2.0-0-installer.run
./xampp-linux-x64-7.2.0-0-installer.run
/opt/lampp/lampp start

Step 4. Download Ourphp version 7.2.0

wget https://zdown.chinaz.com/202305/ourphp-zyb-v7.5.0.20230515.zip
unzip ourphp-zyb-v7.5.0.20230515.zip /opt/lampp/htdocs/
chmod -R 775

Step 5. Setup Ourphp on browser Open your browser and enter localhost or 127.0.0.1 Follow the instruction and install Ourphp.

Step 6. Exploiting the vulnerability Ourphp 7.2.0 version has a vulnerability to XSS (Cross-Site Scripting). To mitigate the vulnerability in the /client/manage/ourphp_out.php file that allows for the execution of XSS code,

you need to modify the code. The vulnerability arises when the "ourphp_admin" parameter is set to "logout," and the controllable variable "out" is echoed.

Attackers can exploit this by injecting a payload such as "</script><script>alert(xss)</script>".

Code: http://localhost/client/manage/ourphp_out.php?ourphp_admin=logout&out=</script><script>alert('xss')</script>

Screenshot 2023-05-29 135740

About