PHPKIT 1.6.4 PL1 includes the session ID in the URL, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks by reading the PHPKITSID parameter from the HTTP Referer and using it in a request to (1) modify the user profile via upload_files/include.php or (2) create a new administrator via upload_files/pk/include.php.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/40033 | vdb entry |
http://www.securityfocus.com/archive/1/487249/100/200/threaded | mailing list |
http://osvdb.org/50998 | vdb entry |