Description
Qool CMS 2.0 RC2 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions by tricking logged-in users into visiting malicious web pages. Attackers can forge POST requests to the /admin/adduser endpoint with parameters like username, password, email, and level to create root-level user accounts without user consent.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
References
www.exploit-db.com/exploits/24627 (ExploitDB-24627)
www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5134.php (Vulnerability Advisory)
www.vulncheck.com/...-cross-site-request-forgery-via-adduser (VulnCheck Advisory: Qool CMS 2.0 RC2 Cross-Site Request Forgery via adduser)