csrf bypass using flash file + 307 redirect method at plugins endpoint
Medium
Vulnerability Details
Hi Security team,
i have found that the request sent to https://my.stripo.email/cabinet/stripeapi/v1/plugin/$userid$/plugins don't have any protection against csrf attacks as the server only validates that the content type is application/json and this can be bypassed using the flash file + 307 redirect technique
Steps To Reproduce:
1. login to your account at https://my.stripo.email
2. visit https://thehackerblog.com/crossdomain/
3. use this link as php redirector https://testingsubdomain.000webhostapp.com/stripo.php
4. in the request headers : Content-Type: application/json;charset=UTF-8
5. the payload
```
{"email":"[email protected]","name":"csrf poc","webUrl":"csrf poc "}
```
##Watch the network traffic from the network tab on the Devtools
##and go back to and refresh the site you'll find all the application data have created
all these steps would be integrated together and performed by the attacker's server
i am attaching a poc video declaring the steps
{F671826}
##Supporting Material/References:
http://www.geekboy.ninja/blog/exploiting-json-cross-site-request-forgery-csrf-using-flash/
http://resources.infosecinstitute.com/bypassing-csrf-protections-fun-profit/#gref
https://blog.cm2.pw/forging-content-type-header-with-flash/
## Impact
attacker can send request to create an application in behalf of user
Actions
View on HackerOneReport Stats
- Report ID: 766205
- State: Closed
- Substate: resolved
- Upvotes: 14