HelpDEZk 1.1.1 has CSRF in admin/home#/logos/ with an impact of remote execution of arbitrary PHP code.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://github.com/albandes/helpdezk/issues/2 | third party advisory patch |
https://www.exploit-db.com/exploits/41824/ | exploit |
http://www.securityfocus.com/bid/97485 | vdb entry |
http://rungga.blogspot.co.id/2017/04/multiple-csrf-remote-code-execution.html | exploit third party advisory technical description |