# Exploit Title : PlaySMS <= 0.9.9.2 CSRF # Date : 2013/12/9 # Exploit Author : Saadat Ullah , saadi_linux@rocketmail.com # Software Link : http://playsms.org/ # Author HomePage: http://security-geeks.blogspot.com/ # Tested on: Server : Apache/2.2.15 PHP/5.3.3 # Cross-site request forgery Playsms is an open source SMS managment system , suffers from Cross-site request forgery through which attacker can manipulate user data via sending him malicious craft url. Playsms is not using any security token to prevent it against CSRF.You can manipulate any userdata. PoC and Exploit to change user password:
#Independent Pakistani Security Researcher