The following warnings occurred:
Warning [2] Undefined variable $unreadreports - Line: 26 - File: global.php(961) : eval()'d code PHP 8.1.2-1ubuntu2.14 (Linux)
File Line Function
/global.php(961) : eval()'d code 26 errorHandler->error
/global.php 961 eval
/showthread.php 28 require_once





× This forum is read only. As of July 23, 2019, the UserSpice forums have been closed. To receive support, please join our Discord by clicking here. Thank you!

  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Penetration testing
#5
Hi,

Thanks for looking into it, and so promptly.

I have had a go in a live environment. First I had a go on the demo site. I had trouble signing up normally (no reaction when I'd hit register on a fully completed form?), so I decided to set up my own live test environment.

I was able to do the same exploit.

1. created spoof form and directed it to the live joinThankyou.php file
2. I removed all the ID=username, ID=other_field_names...
3. Then I edited the script with the Jquery to remove the if(data=success) condition.
4. I generated a real csrf from a live form, then copied it into my spoof form.

After that, I chucked a bunch of characters into the username field and hit submit. That bypassed the validation and entered the database. It was good to see that the quotes I entered were all escaped as either
Code:
&quote
or & # 039.

Hope that helps in some way.

T.
  Reply


Messages In This Thread
Penetration testing - by tomdickson - 03-18-2016, 09:30 AM
Penetration testing - by tomdickson - 03-18-2016, 11:56 AM
Penetration testing - by mudmin - 03-18-2016, 01:21 PM
Penetration testing - by mudmin - 03-18-2016, 01:26 PM
Penetration testing - by tomdickson - 03-19-2016, 02:14 AM
Penetration testing - by mudmin - 03-19-2016, 04:45 PM
Penetration testing - by mudmin - 03-23-2016, 01:14 PM
Penetration testing - by brian - 03-23-2016, 03:36 PM
Penetration testing - by tomdickson - 03-23-2016, 07:23 PM
Penetration testing - by mudmin - 03-25-2016, 01:27 PM

Forum Jump:


Users browsing this thread: 2 Guest(s)