Unauthenticated CSRF(User can input any value for CSRF Token)

Disclosed: 2016-06-08 12:43:59 By footstep To veris
Unknown
Vulnerability Details
Hello Veris, I believe you have implemented `CSRF token` on the registration for a reason. In my research, I found that a user supplied CSRF Token would be accepted and even saved in the browser cookie and will be the set token on subsequent request. This report is limited to the `Register` and `Login` page anyway. And most importantly, there is no verification of the `CSRF token` on the `server side` because if there is, the request shouldn't go through to talk of being saved in the browser cookie. The only verification I can see is if the inserted token is more than set 32 characters. PoC: - Navigate to https://sandbox.veris.in/portal/register/ - Fill the form and the captcha as required - Using a proxy tool, intercept the request (I'm using Burp Proxy) - Change the value of `csrftoken` in cookie field - Copy the same input and paste in `csrfmiddlewaretoken` - Forward the request - You'll get a 200 OK response i.e Request made successfull - In the next request, change the value of `csrftoken` to the one used recently. - You could now check the value of cookie in the browser. - Bam! You found it. I can provide a video proof if needed. I hope you understand Thanks Shuaib Oladigbolu
Actions
View on HackerOne
Report Stats
  • Report ID: 143321
  • State: Closed
  • Substate: informative
  • Upvotes: 5
Share this report