This exploit demonstrates a CSRF vulnerability in Windu CMS 2.2 that allows an attacker to add an admin user via a crafted HTML form. It also includes proof-of-concept code for multiple persistent XSS vulnerabilities in the same software.
Classification
Working Poc 100%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target:Windu CMS 2.2 rev 1430
Auth required
Prerequisites:Victim must be authenticated as an admin · Victim must visit a malicious webpage