Lucene search

K
huntrHdvinnie6EF21E34-F6D9-445A-B657-375C53DC2B43
HistoryOct 27, 2021 - 6:18 a.m.

Cross-Site Request Forgery (CSRF) in area17/twill

2021-10-2706:18:55
hdvinnie
www.huntr.dev
8
csrf
area17/twill
logout
vulnerability
post
edge
firefox
chrome
safari
bug bounty

EPSS

0.001

Percentile

31.0%

Description

Attacker is able to logout a user if a logged in user visits attacker website.

Impact

This vulnerability is capable of forging user to unintentional logout.

Test

Tested on Edge, firefox, chrome and safari.

Fix

You should use POST instead of GET.

To expand:

One way GET could be abused here is that a person (competitor perhaps:) placed an image tag with src=“<your logout link>” ANYWHERE on the internet, and if a user of your site stumbles upon that page, he will be unknowingly logged out.

This is why it should be a POST with a @csrf token.

While this cannot harm a users account it can be a great annoyance.

EPSS

0.001

Percentile

31.0%

Related for 6EF21E34-F6D9-445A-B657-375C53DC2B43