CVE-2021–26215
# Exploit Title: SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditDocument.php
# Date: 15/03/21
# Exploit Author: Tuhin Bose
# Vendor Homepage: https://www.seeddms.org/
# Version: 5.1.x
# CVE : CVE-2021–26215
SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditDocument.php that allows an attacker to edit victim’s documents. To exploit this vulnerability, an attacker has to host the html code in his server and send the link to victim.
Steps to reproduce:
1. Go to https://localhost/out/out.MyDocuments.php
2. Click on Edit on any document.
3. Enter some random(valid) name, comment, keyword, categories and others.
4. Click on save and capture the request using Burpsuite.
5. Right click on the request and click on “Engagement tools” “Generate CSRF poc”
6. Copy the html code and save it as csrf.html on your server.
7. Edit the csrf.html file and change the name, comment, keyword, categories and others what you want to change.
8. Open the html file and click on “submit”.
You’ll see that the details will be changed.