PbootCMS csrf

PbootCMS csrf

我将网站建立在本地,本来想测试添加用户的操作,但是发现这里有formcheck验证,所以失败了
I built the site locally and wanted to test adding users, but found that there was form check validation, so it failed.
在这里插入图片描述
然后我想到了删除用户位置,首先我使用管理员账号登陆,在删除用户的操作时抓包。发现很简单。只有一个id来判断删除哪个用户。
Then I thought about deleting user location. First, I logged in with the administrator’s account and grabbed the package when deleting the user’s operation. The discovery is simple. There is only one ID to determine which user to delete.
在这里插入图片描述
于是我直接构造一个新的url,http://127.0.0.1/cve/p/admin.php/User/del/ucode/10004(上面是10003)
确认这个用户是存在的。然后访问http://127.0.0.1/cve/p/admin.php/User/del/ucode/10004
So I constructed a new URL directly, http://127.0.0.1/cve/p/admin.php/User/del/ucode/10004 (above is 10003).
Confirm that the user exists. Then i click http://127.0.0.1/cve/p/admin.php/User/del/ucode/10004.
在这里插入图片描述
删除成功
Delete successful
在这里插入图片描述
但是这样很容易被熟悉的管理员识别,我们可以利用段网站来进行攻击。
短网址生成网站https://www.ft12.com/
http://127.0.0.1/cve/p/admin.php/User/del/ucode/10004可以缩短为http://u6.gg/gPCcN
访问这个短网址,也可以变为http://127.0.0.1/cve/p/admin.php/User/del/ucode/10004触发漏洞。

But this is easy to identify by experienced administrators, and we can use segment sites to attack.
Short Web Site Generation https://www.ft12.com/
Http://127.0.0.1/cve/p/admin.php/User/del/ucode/10004 can be shortened to http://u6.gg/gPCcN.
Visiting this short web site can also become http://127.0.0.1/cve/p/admin.php/User/del/ucode/10004 to make a attack.
在这里插入图片描述

没有更多推荐了,返回首页