vendor:
60cycleCMS
by:
EL-KAHINA
8,8
CVSS
HIGH
CSRF
352
CWE
Product Name: 60cycleCMS
Affected Version From: 2.5.2
Affected Version To: 2.5.2
Patch Exists: Yes
Related CWE: N/A
CPE: 60cycleCMS
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux
2009
60 cycleCMS V 2.5.2 CSRF Change Username & Password Exploit
This exploit allows an attacker to change the username and password of a 60 cycleCMS V 2.5.2 system by using a CSRF attack. The attacker can craft a malicious HTML page that contains a form with the desired username and password fields. When the victim visits the malicious page, the form will be automatically submitted and the username and password will be changed.
Mitigation:
The best way to mitigate CSRF attacks is to use a combination of server-side and client-side validation. Server-side validation should be used to verify that the request is coming from a trusted source. Client-side validation should be used to ensure that the request is valid and not malicious. Additionally, the use of anti-CSRF tokens can help to prevent CSRF attacks.