Skip to content

Instantly share code, notes, and snippets.

@aaaahuia
Last active April 18, 2022 06:59
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save aaaahuia/f708c6c8a320e0f3afbb9247903c4670 to your computer and use it in GitHub Desktop.
Save aaaahuia/f708c6c8a320e0f3afbb9247903c4670 to your computer and use it in GitHub Desktop.
MCMS CSRF

Product official website:

https://ms.mingsoft.net/

Product download address:

https://gitee.com/mingSoft/MCMS https://github.com/ming-soft/MCMS

Vulnerability Description:

There is a CSRF vulnerability in the background adding user of MCMs administrator. When adding a user without adding a token and verifying the reference, the attacker can phishing attack the administrator by constructing a special page. When the administrator accidentally accesses the special page constructed by the attacker, trigger the payload to secretly add the administrator user, and the attacker can obtain the privileges of the background administrator.

Vulnerability recurrence:

Environment construction reference: https://gitee.com/mingSoft/MCMS The description document in the document can be used After the environment is set up, access the background. The local access background address is: http://localhost:8080/ms/login.do Use the default account password: msopen / msopen After logging in, find the place to add administrator user as shown in the figure below:

image

Add all the information needed to add the administrator, then click save and capture the package:

image

Use burp to generate the payload of CSRF, copy the HTML code and save it locally

image

Save the following HTML code as test.html

image

Then use the same browser you just logged in to open the locally saved HTML page

image

Click submit request above to see the return value and successfully add the administrator.

image

OK!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment