header-logo
Suggest Exploit
vendor:
Kryn.cms
by:
7.5
CVSS
HIGH
Cross-Site Request Forgery, HTML Injection
352
CWE
Product Name: Kryn.cms
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Kryn.cms Cross-Site Request Forgery and HTML Injection Vulnerabilities

The vulnerabilities in Kryn.cms allow a remote attacker to perform administrative actions, gain unauthorized access, delete data, execute arbitrary script or HTML code, and steal authentication credentials.

Mitigation:

Implement proper input validation and authentication mechanisms, and apply security patches.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/41229/info

Kryn.cms is prone to a cross-site request-forgery vulnerability and an HTML-injection vulnerability.

Exploiting these issues may allow a remote attacker to perform certain administrative actions, gain unauthorized access to the affected application, delete certain data, execute arbitrary script or HTML code within the context of the browser, and steal cookie-based authentication credentials. Other attacks are also possible. 

The following example URI is available:

http://www.example.com/admin/backend/window/loadClass/saveItem?noCache=1277145391050&rsn=1&username=admin&passwd=admin&email=suck2%40example.org&groups=[%221%22]&module=users&code=users%2FeditMe%2F