CSRF - Modify Project Settings

Disclosed: 2020-02-03 13:32:36 By ahmd_halabi To stripo
Critical
Vulnerability Details
**Target Url/Endpoint** https://my.stripo.email/cabinet/stripeapi/v1/projects/{Project_Id} **Note** Attacker just need to know victim project Id. ## Summary: This CSRF Vulnerability leads to change user's project settings including General Information, Contacts, Social Networks and Other Options. ## Steps To Reproduce: This POC is a simple example on exploiting this bug. Attacker can exploit it with more advanced techniques and can really lead to critical issues. 1. Navigate to Project Settings -> Modify any data and intercept the request, send it to repeater, and do the following. 2. Take the HTML code format from burp suite -> Engagement Tools -> Generate CSRF POC. 3. Put the piece of code in an html file, then open it. 4. Now hit on the button and intercept its request. 5. Change POST to PATCH. 6. Copy the patch data from the old intercepted request from repeater and paste it to the current intercepted request and modify the data (email for example). 7. Modify the request header of Content-Type: `Content-Type: application/json;charset=UTF-8` 8. Forward the request and CSRF exploited successfully and the modified data changed successfully :) ## Supporting Material/References: Please See this video where I recorded the above PoC in details ██████ ## Impact This attack can be exploited in advanced way to modify all project settings and manipulate its data. Smart attacker can gain a big advantage from this bug. Hope you fix it asap. **Regards**
Actions
View on HackerOne
Report Stats
  • Report ID: 766533
  • State: Closed
  • Substate: resolved
  • Upvotes: 12
Share this report