CSRF bypass
Unknown
Vulnerability Details
Dear Team,
Once again i'm here.
During research of vimeo.com I found that you are using anti-csrf token against csrf attack. but it's not going to validate on server side.
let's see
Step 1: go to https://vimeo.com/forgot_password
Step 2: write your email and click on **help me**.
Step 3: Now before posting make sure **Burp Suite's Interceptor is turned on** to capture the request.
Click on "help me" now, you will see below kind of request in Burp suite:
```
POST /forgot_password HTTP/1.1
Host: vimeo.com
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:35.0) Gecko/20100101 Firefox/35.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: https://vimeo.com/forgot_password
Cookie: vuid=471411067.232973627; __utma=18302654.785580395.1421186258.1421859718.1422384189.4; __utmz=18302654.1421186258.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=18302654.|2=user_type=basic=1^3=ms=0=1^7=video_count=0=1; site_settings=%7B%22sticky_page%22%3Anull%7D; has_logged_in=1; __gads=ID=3eb5153d2e8ef474:T=1421187886:S=ALNI_MZ62UIUIjNjSl4kp3auNxfRHSXdnQ; stats_start_date=2015%2F01%2F10; stats_end_date=2015%2F01%2F14; __utmb=18302654.4.10.1422384189; __utmc=18302654; __utmli=forgot_form; xsrft=e9b0179d3dd45669bd6d44a2484fb0f5.0
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 79
email=shubhamgupta109.1995%40gmail.com&token=e9b0179d3dd45669bd6d44a2484fb0f5.0
```
now you can see you are using **anti-csrf token** there but it's not going to validate. attacker can flood user account with too many mails for password reset request.
I'ave attached POC of the same.
Let me know if you needed more info.
Best Regard
Shubham
Actions
View on HackerOneReport Stats
- Report ID: 45428
- State: Closed
- Substate: informative
- Upvotes: 2