HTML Form Without CSRF Protection Vulnerability

Disclosed: 2014-07-23 12:26:56 By anonymous_india To uzbey
Unknown
Vulnerability Details
HTML Form Without CSRF Protection Vulnerability Respected Sir/Madam I Hope Your Cooperate With Me Cause It's Not Easy To Find Vulnerability On Your Official Website Vulnerability description Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.Myself found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the affected HTML form. Affected items / (05021b83a694b8a6bcf20726b9e74a3e) /content/advertising /news-list /user/login /user/login (bbec132626041c12fd5a4c3464846698) /user/password /user/password (d36afa692532337cc8b2ed285e3b3f11) /user/register The impact of this vulnerability An attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application. How to fix this vulnerability Check if this form requires CSRF protection and implement CSRF countermeasures if necessary. Proof Of Concept Vulnerability description Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.Myself found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the affected HTML form. This vulnerability affects /user/register. Attack details Form name: <empty> Form action: https://staging.uzbey.com/user/register?destination=user/register Form method: POST Form inputs: name [Text] pass [Password] form_build_id [Hidden] form_id [Hidden] op [Submit] Request Header Pragma: no-cache Cache-Control: no-cache Referer: https://staging.uzbey.com/ Acunetix-Aspect: enabled Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c Acunetix-Aspect-Queries: filelist;aspectalerts Host: staging.uzbey.com Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36 Accept: */* Respond Header HTTP/1.1 200 OK Date: Mon, 23 Jun 2014 10:54:29 GMT Server: Apache Expires: Sun, 19 Nov 1978 05:00:00 GMT Last-Modified: Mon, 23 Jun 2014 10:54:29 +0000 Cache-Control: no-cache, must-revalidate, post-check=0, pre-check=0 ETag: "1403520869" Content-Language: en Vary: Accept-Encoding,User-Agent Content-Length: 43094 Connection: close Content-Type: text/html; charset=utf-8 Original-Content-Encoding: gzip The impact of this vulnerability An attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application. How to fix this vulnerability Check if this form requires CSRF protection and implement CSRF countermeasures if necessary. Thankz For Reading My Message Have A Good Day Respected Sir/Madam Please Approved My Vulnerability Cause Of My Hard Work Which I Had Done It's Not Easy To Find Vulnerability On Your Official Website I Hope You Get My Point Of View.
Actions
View on HackerOne
Report Stats
  • Report ID: 17312
  • State: Closed
  • Substate: informative
  • Upvotes: 1
Share this report