Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2020-37046 β€” AI Deep Analysis Summary

CVSS 5.3 Β· Medium

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Cross-Site Request Forgery (CSRF) Vulnerability**. Attackers can forge requests to add admin accounts without user knowledge. Impact: **Privilege Escalation + Backdoor Account**.

Q2Root Cause? (CWE/Flaw)

πŸ” **Root Cause: Missing CSRF Token Validation**. CWE-352. The `tambahuser.php` endpoint does not validate request origin, allowing arbitrary form submissions.

Q3Who is affected? (Versions/Components)

🎯 **Affected: Online Graduation Announcement System 1.0**. Limited to this version, component: User Management Module (`tambahuser.php`).

Q4What can hackers do? (Privileges/Data)

πŸ’» **Attackers can create admin accounts**. No original credentials required; directly inject admin users to gain backend control.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Low exploitation barrier**. No authentication or special configuration needed. Attackers only need to trick users into clicking malicious links or visiting malicious pages.

Q6Is there a public Exp? (PoC/Wild Exploitation)

🧨 **Exploit available**. ExploitDB-48571 provides PoC, enabling direct construction of malicious HTML forms to inject admin accounts.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-check method**: Verify if `/tambahuser.php` lacks CSRF validation. Scan for form submission endpoints vulnerable to forgery.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **No official patch available**. According to VulnCheck and ExploitDB, no official fix or update has been released.

Q9What if no patch? (Workaround)

πŸ›‘οΈ **Temporary mitigation**: Add CSRF Token; enable Referer check; restrict user addition permissions; use SameSite Cookie.

Q10Is it urgent? (Priority Suggestion)

⚠️ **High priority!** CVSS 3.1 score (I:L), enabling direct privilege escalation. Immediate fix or temporary protection recommended.