In The Name Of Allah +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ # Exploit Title:Cute News -Add admin CSRF Vulnerablity # Date :  2012-06-26    # Author : Black-Hole    # Vendor : http://cutephp.com/ # Version: 1.4.7       # E-Mail: Gigelaknak [at] Yahoo [dot] com   # Visit us: Ashiyane.org/forums # Category: Webapps # Google dork:"Powered by CuteNews 1.4.7" # Demo site: http://www.rightclickimaging.co.uk/news/ # Team : Ashiyane Digitl Security Team +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 1.Replace your target path with http://localhost/cutenews/ at the second line of exploit code 2.Replace test1 with your username ,test2 with your password ,test3 with your nickname and your e-mail with Gigelaknak@yahoo.com 3.Save the exploit code as .html file and upload it some where ,Then give the link to admin using social engineering ! Tnx 2 N.A HiDdeEn ,Hijacker, Virangar, Iman_taktaz ... And all Iranian Hackers ... Special Tnx 2 All Ashiyane Members ... Exploit Code :