Possible to unsubscribe from activities using CSRF @ mijn.werkenbijdefensie.nl

Disclosed: 2017-05-27 14:51:19 By jorik To radancy
Medium
Vulnerability Details
**Domain and URL:** https://mijn.werkenbijdefensie.nl/activiteiten/bezocht **Summary:** Possible to unsubscribe from activities/events using CSRF **Description:** it is possible to unsubscribe a logged in user from any subscribed events. The unsubscribe is done by a GET-call which is (of course) not protected by an anti-forgery token. The ID of the event is given, which can be found for everyone on the events-overview page. It would be very easy to make an attack page including all events, unsubscribing all users. ## Browsers Verified In: * Chrome Version 56.0.2924.87 @ Windows 10 ## Steps To Reproduce: 1. User should be logged in to mijn.werkenbijdefensie.nl 2. User should visit a page with the following HTML (for example, triggering the GET in any way is good enough): ``` <html> <head> <title>CSRF</title> </head> <body> You're unsubscribed from activity # 301449 and # 301731 <img src="https://mijn.werkenbijdefensie.nl/activiteiten/uitschrijven/301449" /> <img src="https://mijn.werkenbijdefensie.nl/activiteiten/uitschrijven/301731" /> </body> </html> ``` 3. User is unsubscribed from the specific activities ## Known steps to resolve: Do not use the GET-method for any operation that changes something. Next, add an anti-forgery token as is present everywhere on the site. ## Supporting Material/References: * I'm sure you aware, but: https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
Actions
View on HackerOne
Report Stats
  • Report ID: 217555
  • State: Closed
  • Substate: resolved
  • Upvotes: 12
Share this report