Cross-Site Request Forgery (CSRF) in bigprof-software/online-invoicing-system

Valid

Reported on

Jun 27th 2021


✍️ Description

The /app/admin/pageDeleteMember.php?memberID=<x> does not have a CSRF protection. This could be used by attackers to trick the admin to delete a member from their invoice system.

🕵️‍♂️ Proof of Concept

For this attack to work, a logged in admin, should visit the POC page.

<html>
<body>
<a href="http://<host>/online-invoicing-system-4.8/app/admin/pageDeleteMember.php?memberID=<account_id>">Click Here !</a>
</body>
</html>

When a logged in user clicks the link a member is deleted.

💥 Impact

This vulnerability is capable of deleting members from the platform.

Fix

Introduce a CSRF token in the request.

References

We have contacted a member of the bigprof-software/online-invoicing-system team and are waiting to hear back a year ago
BigProf Software validated this vulnerability a year ago
Oomb has been awarded the disclosure bounty
The fix bounty is now up for grabs
BigProf Software confirmed that a fix has been merged on e822cb a year ago
BigProf Software has been awarded the fix bounty
BigProf
a year ago

Maintainer


Thanks for the responsible disclosure. I also found that the same issue affected admin/pageDeleteRecord.php and fixed it as well.

to join this conversation