CSRF - Modify Company Info

Disclosed: 2020-06-11 18:18:12 By ahmd_halabi To deptofdefense
Medium
Vulnerability Details
**Target Url** ███/services/user/manageAccountCompany **Summary:** Similar to███████, but on different endpoint. The application is missing CSRF Token on Editing company info endpoint. This lead to CSRF attack. **Bypassing Content-Type** The application is just accepting Content-Type as application/json. This can be bypassed in several ways. One of the ways is to Forge Content-Type header with flash. You need a flash file capable of sending cross-domain requests and a 307 redirector page. For more info please see: https://blog.cm2.pw/forging-content-type-header-with-flash/ ## Step-by-step Reproduction Instructions 1. Edit your company info and intercept its request. 2. Get the HTML code format from burp suite -> Engagement Tools -> Generate CSRF POC. 3. Click Test in Browser button, and on another browser/tab accessed by the victim account, paste the link. 4. Now hit on the button and intercept its request. 5. Modify the request header of Content-Type to: application/json. 6. Forward the request and CSRF exploited successfully and the info changed successfully. ## Suggested Mitigation/Remediation Actions Add a csrf-token in the header or in an hidden input to check if the user that is doing this action authorized or not. ## Impact This action is critical and sensitive. Attacker can upload this file to a url. Sends it to the victims. And when the authenticated victims navigate to the url their profile info will be modified. **Regards.**
Actions
View on HackerOne
Report Stats
  • Report ID: 856981
  • State: Closed
  • Substate: resolved
  • Upvotes: 10
Share this report