Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-56924 PoC — CodeAstro Internet Banking System 跨站请求伪造漏洞

Source
Associated Vulnerability
Title:CodeAstro Internet Banking System 跨站请求伪造漏洞 (CVE-2024-56924)
Description:A Cross Site Request Forgery (CSRF) vulnerability in Code Astro Internet banking system 2.0.0 allows remote attackers to execute arbitrary JavaScript on the admin page (pages_account), potentially leading to unauthorized actions such as changing account settings or stealing sensitive user information. This vulnerability occurs due to improper validation of user requests, which enables attackers to exploit the system by tricking the admin user into executing malicious scripts.
Readme
# CVE-2024-56924

# Vulnerability Description
<h5>A Cross-Site Request Forgery (CSRF) vulnerability exists in the code astro Internet Banking System version 2.0.0, which allows remote attackers to perform unauthorized actions on behalf of authenticated users, such as administrators, without their knowledge. By crafting a malicious HTML page, an attacker can trick an authenticated user (such as an admin) into submitting a request to modify sensitive account details (e.g., name, email) on the target system. This vulnerability arises due to the lack of CSRF protection on the account modification page (e.g., pages_account.php), allowing an attacker to bypass security mechanisms and execute unauthorized actions on the user's behalf.</h5>

# Versions Affected
<h5>2.0.0</h5>

# Researcher
<h5>Pratheep M</h5>

# Proof Of Concept

<h3>STEP BY STEP PROCEDURE</h3>
<h5>I have added the video POC for your reference below.</h5>

<h5>STEP 1: Click on the Admin Portal and log in using the default credentials.</h5>
<h5>STEP 2: Navigate to the Accounts section and use Burp Suite to intercept the request.</h5>
<h5>STEP 3: Click the Update button and capture the request. Then, right-click on the panel, go to Engagement Tools → Generate CSRF PoC.</h5>
<h5>STEP 4: Modify the request to update the name and email fields, and click Test in Browser.</h5>
<h5>STEP 5: Paste the PoC into the browser, and you will observe that the name and email have been successfully changed.</h5>

# Video POC
<h5>Releasing soon.</h5>
<p><img align="center" alt="poc" src="https://github.com/ipratheep/CVE-2024-56924/blob/main/poc.gif" width="700" height="400"></p>
File Snapshot

[4.0K] /data/pocs/bc61d08b170e0245e24cf4400755c29c4ac2e7a0 └── [1.6K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →