Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
CVE-2021-44117/CSRF in FuelCMS
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
15 lines (14 sloc)
780 Bytes
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Exploit Title: Cross Site Request Forgery | |
| # Google Dork: NA | |
| # Date: 11/03/2022 | |
| # Exploit Author: Ali J. | |
| # Vendor Homepage: https://www.getfuelcms.com/ | |
| # Software Link: https://github.com/daylightstudio/FUEL-CMS/releases/tag/1.5.0 | |
| # Version: 1.5.0 | |
| # Tested on: Windows 10 | |
| # CVE : CVE-2021-44117 | |
| Steps to Reproduce: | |
| 1. Login with user 1 and navigate to localhost/FUEL-CMS/fuel/sitevariables | |
| 2. Select any variable, click on delete button and select "yes, delete it". Intercept this request and generate a CSRF POC for this. After that drop the request. | |
| 3. Login with user 2 in a seperate browser and execute the CSRF POC. | |
| 4. Observe that the site variable has been deleted. To confirm, login with user 1 again and observe that the variable has been deleted from site variables. |