The exploit demonstrates CSRF vulnerabilities in Ez Guestbook 1.0, allowing unauthorized password changes and post deletion via crafted HTTP requests. It includes functional HTML forms and URLs to trigger these actions.
Classification
Working Poc 90%
Attack Type
Auth Bypass
Complexity
Trivial
Reliability
Reliable
Target:Ez Guestbook 1.0
No auth needed
Prerequisites:Victim must be authenticated as admin and tricked into submitting the form or visiting the malicious URL