vendor:
gpeasy
by:
Giuseppe 'giudinvx' D'Inverno
8,8
CVSS
HIGH
Cross-Site Request Forgery (CSRF)
352
CWE
Product Name: gpeasy
Affected Version From: 1.6.1
Affected Version To: 1.6.1
Patch Exists: NO
Related CWE: N/A
CPE: a:gpeasy:gpeasy
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010
gpEasy <= 1.6.1 CSRF Remote Add Admin Exploit
This exploit allows an attacker to add an admin user to the gpEasy CMS by sending a maliciously crafted request to the vulnerable application. The attacker can specify the username, password, and email address of the new admin user. The exploit code provided creates a form with the necessary fields and submits it to the vulnerable application.
Mitigation:
Implementing a CSRF token in the application can help prevent this type of attack.