# Exploit Title: ClickHeat <1.1.4 Change Admin Password CSRF # Google Dork: allinurl:/clickheat/ # Date: 11-06-2015 # Exploit Author: David Shanahan (@CyberpunkSec) # Contact: https://twitter.com/CyberpunkSec # Vendor Homepage: http://www.labsmedia.com/clickheat/index.html # Software Link: http://sourceforge.net/projects/clickheat/files/clickheat/ # Version: 1.14 # Tested on: Windows ---- Description ---- ClickHeat is vulnerable to a CSRF attack because it does not implement a CSRF token when updating the config file. If an authenticated admin is tricked into opening this malicious URL, the form will be submitted which changes the administrator password to the one the attacker has specified. ---- CSRF PoC ---- Set the value of "adminLogin" to the administrators username, then set the value of "adminPass" to a md5 hash of the password you want. (you may also need to change the "logPath" & "cachePath") /* CODE */
/* CODE */ ---- Solution ---- The ClickHeat project seems to be dead, as it has not been updated since late 2011. Due to this, I truly doubt a patch will be issued so I would recommend removing this product from your website.