This PoC demonstrates a CSRF vulnerability in Campsite CMS 3.4.0, which allows an attacker to create an admin user with the credentials 'root' and 'rootroot'. This is done by crafting a malicious HTML page that contains a form with the necessary parameters to create an admin user, and submitting it automatically when the page is loaded.
Local root by adding temporary user toor:toor with id 0 to /etc/passwd & /etc/shadow. Does not prompt for login by creating temporary SSH key and authorized_keys entry.
GetSimple CMS 2.01 is vulnerable to Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS). An attacker can exploit these vulnerabilities to change the admin password, delete pages, delete all backups, and logout the administrator. Additionally, more vulnerabilities can be found in the admin panel.
TheHostingTool 1.2.2 is vulnerable to multiple CSRF attacks. An attacker can create a malicious HTML page that, when visited by an authenticated user, can perform actions on behalf of the user. The malicious HTML page can be used to create a staff account, delete a staff account, mass email the clients, and logout the administrator.
This vulnerability exists in the comments section. An attacker can submit an evil XSS script in the comment section, which will be executed when the page is loaded.
This vulnerability exists in the comments section. Goto any of the option like HEALTH STATS,FITNESS STATS or CUSTOM STATS, select Add/Update option and insert your xss script. Once inserted goto Edit records and check your xss.
Orbis CMS 1.0.2 is vulnerable to multiple CSRF attacks. An attacker can exploit these vulnerabilities to change the administrator password, create a new administrator user, delete an existing user, and logout the administrator.
TomatoCMS 2.0.5 is vulnerable to multiple CSRF attacks. An attacker can exploit these vulnerabilities to change the administrator password and create a new administrator user.
TomatoCart 1.0.1 is vulnerable to multiple CSRF vulnerabilities. An attacker can exploit these vulnerabilities to create an admin user or change the password of an existing admin user.
Frog CMS 0.9.5 is vulnerable to multiple CSRF attacks. An attacker can exploit this vulnerability to create an admin user, delete users, delete pages, delete snippets, delete layouts, and delete files (if the File Manager plugin is installed). The attacker can craft a malicious HTML page containing a form with hidden fields that will be automatically submitted when the page is loaded. The form will contain the parameters necessary to perform the desired action.