vendor:
Bigace CMS
by:
Yashar shahinzadeh
7,5
CVSS
HIGH
CSRF
352
CWE
Product Name: Bigace CMS
Affected Version From: 2.7.8
Affected Version To: 2.7.8
Patch Exists: NO
Related CWE: N/A
CPE: a:bigace:bigace_cms
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux & Windows, PHP 5.2.9
2013
Bigace CMS CSRF – Adding an admin account
A CSRF vulnerability exists in Bigace CMS which allows an attacker to add an admin account by sending a malicious link to the victim. The malicious link contains a form with pre-filled values for the username, language, user groups, state, email, passwordnew and passwordcheck fields. When the victim visits the malicious link, the form is automatically submitted and an admin account is created.
Mitigation:
The application should verify that the request is coming from an authenticated user and not from an attacker. The application should also use a random token in the form to prevent CSRF attacks.