vendor:
Simple PHP Blog
by:
Besim
7,5
CVSS
HIGH
Cross-Site Request Forgery
352
CWE
Product Name: Simple PHP Blog
Affected Version From: 0.8.4
Affected Version To: 0.8.4
Patch Exists: NO
Related CWE: N/A
CPE: a:simple_php_blog:simple_php_blog:0.8.4
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu 14.04.5
2016
Simple PHP Blog 0.8.4 – Cross-Site Request Forgery (Add Admin)
Simple PHP Blog 0.8.4 versions is vulnerable to CSRF attack (No CSRF token in place) meaning that if an admin user can be tricked to visit a crafted URL created by attacker (via spear phishing/social engineering), a form will be submitted to (http://localhost/simple/manage_users.php?action=update&type=new) that will add a new user as administrator. Once exploited, the attacker can login to the admin panel (http://localhost/simple/login.php) using the username and the password he posted in the form.
Mitigation:
Implement CSRF token in the application to prevent CSRF attack.