Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF) #30

Closed
h18192h opened this issue Oct 29, 2022 · 1 comment
Closed

Comments

@h18192h
Copy link

h18192h commented Oct 29, 2022

EyouCMS v1.5.9 has a vulnerability, Cross-site request forgery(CSRF).Located in the background, edit the administrator profile. This vulnerability may cause the modification of personal information such as administrator password, mobile phone number, and email address. To exploit this vulnerability, a constructed HTML file needs to be opened.
1、Go to the back office - > personal information
图片1
图片2
The password is “admin123456”
2、Construct a request package to change passwords, mobile phone numbers, email addresses, and other basic information.
图片3
The above figure shows the constructed web page code, using CSRF to change its password to "csrftest", the mobile phone number to "11111111111", and the email address to "123@csrf.test".
3、View the administrator's profile:
图片4
At this time, the administrator password is "admin123456", and other information is shown in the preceding figure.
4、Click on the constructed web page.
图片5
Return to the backend page to view the administrator's profile.
图片6
Successfully used CSRF to modify mobile phone number and email address.
Verify that the password is changed to "csrftest":
图片7
图片8
Login successful!

@weng-xianhu
Copy link
Owner

已修复,加上表单令牌验证,阻止跨站请求伪造,将在v1.6.2版本发布更新包

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants