[+] Credits: John Page aka hyp3rlinx [+] Website: hyp3rlinx.altervista.org [+] Source: http://hyp3rlinx.altervista.org/advisories/AS-PHPFILENAVIGATOR0812a.txt Vendor: ================================ pfn.sourceforge.net Product: =================================== PHPfileNavigator v2.3.3 (pfn) Is state-of-the-art, open source web based application to complete manage your files and folders. Vulnerability Type: ================================ CSRF add arbitrary user accounts CVE Reference: ============== N/A Vulnerability Details: ===================== No CSRF token exists when creating user accounts, this allows us to exploit the application and add arbitrary users The ?PHPSESSID= cookie used in URL is useless as we can just replace the value with whatever. e.g. ?PHPSESSID='inthesignofevil' or just omit it all together makes no difference exploit will still succeed. Next create our form POST and a self calling Javascript function, then get a logged in user to click our malicious linx or visit our webpage where they will be PWN3D. Tested using xampp-1.7.0 Exploit code(s): ===============