目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2025-28355 PoC — Personal Management System 安全漏洞

来源
关联漏洞
标题:Personal Management System 安全漏洞 (CVE-2025-28355)
Description:Personal Management System是Dariusz个人开发者的一个用于管理个人数据的 Web 应用程序。 Personal Management System 1.4.65版本存在安全漏洞,该漏洞源于容易受到跨站请求伪造攻击,可能导致执行任意代码和获取敏感信息。
Description
It was identified that the https://github.com/Volmarg/personal-management-system application is vulnerable to CSRF attacks.
介绍
# CVE-2025-28355
It was identified that the https://github.com/Volmarg/personal-management-system application is vulnerable to CSRF attacks, 
one of the many action an attacker can perform is trick a legitimate user to run a cross site request that will alter his/her password, 
allowing the attacker access to the application. The vulnerability requires browsers that have the “SameSite” cookie attribute defaults value to none such as Firefox.

**Vektor String**: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N

**CVSS Score**: 4.7

Proof of concept
For the demonstration I will use the username tester and change that user password to “missingcsrf”
Note that the attacker can change other values such as the nickname and the lock password.
The application is generally vulnerable to CSRF, meaning a malicious user can trick users to upload
files change password mess records etc.

![image](https://github.com/user-attachments/assets/8c2a1ec9-c6a0-42d9-b19d-eb9a2125bc62)


This is a simple html page that will make the cross-site request when the user visit the malicious URL.

![image](https://github.com/user-attachments/assets/525fddb2-7390-4089-9087-5d7d597b21be)

Running the above in a Firefox browser, the password changed successfully.

![image](https://github.com/user-attachments/assets/c289c40f-2eb2-40dc-b47d-a422d5ed6444)

Finally, we log in with the modifies password and we can see we getting redirected to the dashboard
page, which means the login was successful.

![image](https://github.com/user-attachments/assets/809e640c-a6bd-4426-9879-f966efc056de)


文件快照

[4.0K] /data/pocs/ae5c650ae2f5d81b9ce12352a83859d35c6e7233 └── [1.5K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。