Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

Test


ghost's Avatar
0 0

What a lovely 900th post!


bl4ckc4t's Avatar
Banned
0 0

Nicely done, mozzer.

-Bl4ckC4t


ghost's Avatar
0 0

No problem

Thought I'd do something with the admin panel but then I realised that more members would see it like this


ghost's Avatar
0 0

just another 100 to go eh mozzer?


ghost's Avatar
0 0

CSRF is getting SO boring.

It used to be cool. Now it's just lame.


ghost's Avatar
0 0

Yes. When I discovered it, it was fun (I didn't get HoF. Almost everybody knew it).

Well, I guess I should look for new exploits here :|


ghost's Avatar
0 0

How does that work? :S google…:angry:


ghost's Avatar
0 0

Basically, the logout page has a CSRF vulnerability.

This means that whenever anyone loads the page the get logged out, simple

They get logged out because browsers interpret images as html pages and request them using the standard HTTP GET

This means that cookies and headers can be pass with them

The problem is not people posting images but the vulnerability in the logout page - I think that the admins haven't had time to address this or didn't know how it worked


ghost's Avatar
0 0

Anyone got some good tutorial on how CSRF works?


ghost's Avatar
0 0

Chris Shiflett or google.

I may write one


SySTeM's Avatar
-=[TheOutlaw]=-
20 0

Hehehe, CSRF isn't working now :)


ghost's Avatar
0 0

Yeah. You put token


ghost's Avatar
0 0

Hmmm… my guess is that you're checking the referer?


SySTeM's Avatar
-=[TheOutlaw]=-
20 0

mozzer wrote: Hmmm… my guess is that you're checking the referer?

Nope, muahaha!


ghost's Avatar
0 0

Token, you bastard

Hmm… now I gotta think

AHA, cracked it


SySTeM's Avatar
-=[TheOutlaw]=-
20 0

mozzer wrote: AHA, cracked it

Well I'm not getting logged out…


ghost's Avatar
0 0

Updating the code atm

Was working a second ago