vendor:
Gökhan Balbal
by:
KnocKout
8,8
CVSS
HIGH
Cross-Site Request Forgery
352
CWE
Product Name: Gökhan Balbal
Affected Version From: v2.0
Affected Version To: v2.0
Patch Exists: NO
Related CWE: N/A
CPE: a:wmscripti:gokhan_balbal
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020
Gökhan Balbal v2.0 => Cross-Site Request Forgery Exploit (Add Admin)
Gökhan Balbal v2.0 is vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can craft a malicious HTML page that contains a form with hidden fields that when submitted, will add an admin user to the application. The malicious page can be hosted on a website or sent via email to a user of the application. When the user visits the malicious page, the form will be automatically submitted and the attacker will gain admin access to the application.
Mitigation:
To mitigate CSRF attacks, the application should implement a CSRF token that is unique to each user session. The token should be included in all forms and requests and should be validated on the server side.