Open
Description
There is an Cross-site request forgery vulnerability in your latest version of the CMS v6.1.0
Download link: "https://www.damicms.com/downes/dami.rar"
Vulnerability trigger point:
http://damicms/admin.php?s=/Admin/doadd
1、Log in as admin
2、Choose this part
3、Capture the package to generate a POC file and run it
4、Refresh page has changed
5.check source code
There are some codes check token, but as if not take function
We find the default /Admin/Conf/config.php
'TOKEN_ON' => false,
Means not user token, so have the Cross-site request forgery vulnerability

Metadata
Metadata
Assignees
Labels
No labels





