Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-18326 PoC — Subrion CMS 跨站请求伪造漏洞

Source
Associated Vulnerability
Title:Subrion CMS 跨站请求伪造漏洞 (CVE-2020-18326)
Description:Subrion CMS是Subrion团队的一套基于PHP的内容管理系统(CMS)。该系统可被集成到网站,并支持多种扩展插件等。 Subrion CMS 4.2.1 中存在安全漏洞,该漏洞允许远程未经身份验证的恶意用户通过成员管理员功能向受害者发送授权请求,并成功创建任意管理员用户。
Description
Exploit PoC for CVE-2020-18326
Readme
# Subrion CMS 4.2.1 - Cross Site Request Forgery (CSRF) (Add Administrator user)
# Description
Subrion CMS is easy to install and simple to manage. Use it as a stand-alone application or in conjunction with other applications to create entry level sites, mid-sized or large sites.

Cross Site Request Forgery (CSRF) vulnerability exists in Intelliants Subrion CMS v4.2.1 via the Members administrator function, which could allows a remote unauthenticated malicious user send an authorised request to victim and successfully create an arbitrary administrator user.

**Date**: 27-02-2022 \
**Software Link:** https://subrion.org \
**Exploit Author**: HaMM0nz \
**CVE**: CVE-2020-18326 \
**Category:** Web Application

# Proof of Concept
1. Craft the HTML and host the link in web application. (Please refer CVE-2020-18326.html)
2. Send the link to the victim.
3. A new administrator user will be created with the name "admincsrf". 

# Timeline
**Discovery and report** : 24 June 2019 \
**CVE ID was assigned** : 11 Aug 2021 \
**Public** : 27 February 2022
# Solution
Consider complying to the OWASP's CSRF prevention guidelines. (https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html)
File Snapshot

[4.0K] /data/pocs/7cdb26e7408fc9043dc85ef8a23fe9216bd9887e ├── [1.6K] CVE-2020-18326.html └── [1.2K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.