Lucene search

K
huntrHdvinnie9D3D883C-D74C-4FE2-9978-A8E3D1CCF9F3
HistoryDec 09, 2021 - 3:15 p.m.

Cross-Site Request Forgery (CSRF) in microweber/microweber

2021-12-0915:15:12
hdvinnie
www.huntr.dev
9

0.001 Low

EPSS

Percentile

21.0%

Description

Attacker is able to logout a user if a logged in user visits attacker website.

Impact

This vulnerability is capable of forging user to unintentional logout.

Test

Tested on Edge, firefox, chrome and safari.

Fix

You should use POST instead of GET (ANY).

To expand:

One way GET could be abused here is that a person (competitor perhaps:) placed an image tag with src=“<https://example.com/logout&gt;” ANYWHERE on the internet, and if a user of your site stumbles upon that page, he will be unknowingly logged out.

This is why it should be a POST with a @csrf token.

“While this cannot harm a users account it can be a great annoyance and is a valid CSRF.” As a maintainer of a few Laravel projects myself this is a simple fix. You will see that laravel itself now uses a POST request for logout and not GET. See laravel-ui, laravel-breeze and laravel-jetstream for references. You can also find info on Laracasts forums and laravel issue tracker. There may be cases when this may be used in a multi-stage attack to first log someone out, then prompt them to log in on a spoofed page, thus stealing their credentials

0.001 Low

EPSS

Percentile

21.0%

Related for 9D3D883C-D74C-4FE2-9978-A8E3D1CCF9F3