================================================================================================= Vulnerable Software: Dragonfly CMS v9.3.3.0 Downloaded and tested from: http://dragonflycms.org/Downloads/get=28/ Fileinfo:dragonflycms.org Dragonfly9.3.3.0.zip 2.25 MB 70aea682301253637844d7caa10c3ed0 ================================================================================================= Vuln Desc: Dragonfly CMS v9.3.3.0 suffers from CROSS SITE REQUEST FORGERY vulnerability. Will Pwn: If currently logged administrator visits malicious LINK which contains POC code(see below) New Super Admin will be created on remote site with this credentials: Username: MySecRet1 Email: MySecRet1@localhost.tld Password: MySecRet1 @Print Screen on Success Pwn: http://s019.radikal.ru/i635/1203/f1/03e535781d5f.png ================================================================================================= /* Tested on: Windows XP SP2 (32 bit) Apache: 2.2.21.0 PHP Version: 5.2.17.17 mysql> select version() -> ; +-----------+ | version() | +-----------+ | 5.5.21 | +-----------+ Successfully exploitates. */ ===================Dragonfly CMS v9.3.3.0 CSRF ADD SUPER ADMIN Proof Of Concept Exploit===================== Dragonfly CMS v9.3.3.0 CSRF ADD SUPER ADMIN Proof Of Concept Exploit
===================================EOF========================================================== /AkaStep ^_^ GreetZ to all: packetstormsecurity.* ,securityfocus.com,security.nnov.ru +--------------+ | Live | +--------------+ | 1331522784 | +--------------+