Cross-Site Request Forgery (CSRF) in bigprof-software/online-invoicing-system
Valid
Reported on
Jun 27th 2021
✍️ Description
The /app/admin/pageDeleteMember.php?memberID=<x>
does not have a CSRF protection. This could be used by attackers to trick the admin to delete a member from their invoice system.
🕵️♂️ Proof of Concept
For this attack to work, a logged in admin, should visit the POC page.
<html>
<body>
<a href="http://<host>/online-invoicing-system-4.8/app/admin/pageDeleteMember.php?memberID=<account_id>">Click Here !</a>
</body>
</html>
When a logged in user clicks the link a member is deleted.
💥 Impact
This vulnerability is capable of deleting members from the platform.
Fix
Introduce a CSRF token in the request.
Occurrences
References
We have contacted a member of the
bigprof-software/online-invoicing-system
team and are waiting to hear back
2 years ago
Thanks for the responsible disclosure. I also found that the same issue affected admin/pageDeleteRecord.php
and fixed it as well.
to join this conversation