Pixelimity 1.0 has cross-site request forgery via the admin/setting.php data [Password] parameter.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://github.com/pixelimity/pixelimity/issues/20 | third party advisory exploit |
http://packetstormsecurity.com/files/161276/Pixelimity-1.0-Cross-Site-Request-Forgery.html | exploit vdb entry third party advisory |