This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Cross-Site Request Forgery (CSRF) Vulnerability**. Attackers can forge requests to add admin accounts without user knowledge. Impact: **Privilege Escalation + Backdoor Account**.
Q2Root Cause? (CWE/Flaw)
π **Root Cause: Missing CSRF Token Validation**. CWE-352. The `tambahuser.php` endpoint does not validate request origin, allowing arbitrary form submissions.
Q3Who is affected? (Versions/Components)
π― **Affected: Online Graduation Announcement System 1.0**. Limited to this version, component: User Management Module (`tambahuser.php`).
Q4What can hackers do? (Privileges/Data)
π» **Attackers can create admin accounts**. No original credentials required; directly inject admin users to gain backend control.
Q5Is exploitation threshold high? (Auth/Config)
π **Low exploitation barrier**. No authentication or special configuration needed. Attackers only need to trick users into clicking malicious links or visiting malicious pages.
Q6Is there a public Exp? (PoC/Wild Exploitation)
𧨠**Exploit available**. ExploitDB-48571 provides PoC, enabling direct construction of malicious HTML forms to inject admin accounts.
Q7How to self-check? (Features/Scanning)
π **Self-check method**: Verify if `/tambahuser.php` lacks CSRF validation. Scan for form submission endpoints vulnerable to forgery.
Q8Is it fixed officially? (Patch/Mitigation)
π οΈ **No official patch available**. According to VulnCheck and ExploitDB, no official fix or update has been released.
Q9What if no patch? (Workaround)
π‘οΈ **Temporary mitigation**: Add CSRF Token; enable Referer check; restrict user addition permissions; use SameSite Cookie.
Q10Is it urgent? (Priority Suggestion)
β οΈ **High priority!** CVSS 3.1 score (I:L), enabling direct privilege escalation. Immediate fix or temporary protection recommended.