Cross-Site Request Forgery (CSRF) in bigprof-software/online-rental-property-manager


Reported on

Jul 3rd 2021

✍️ Description

The app/admin/pageDeleteMember.php?memberID=<id> does not have a CSRF protection. This could be used by attackers to trick the admin to delete a member from their system.

🕵️‍♂️ Proof of Concept

For this attack to work, a logged in admin, should visit the POC page.

<a href="http://<host>/online-rental-property-manager-6.8/app/admin/pageDeleteMember.php?memberID=member%2011">Click Here !</a>

When an admin clicks the link a member is deleted.

💥 Impact

This vulnerability is capable of deleting members from the platform.

Fix Introduce a CSRF token in the request.


We have contacted a member of the bigprof-software/online-rental-property-manager team and are waiting to hear back 2 years ago
BigProf Software marked this as fixed with commit 0a2aaf 2 years ago
BigProf Software has been awarded the fix bounty
This vulnerability will not receive a CVE
to join this conversation