Cross-Site Request Forgery (CSRF) in hdinnovations/unit3d-community-edition
Reported on
Nov 15th 2021
Description
More unprotected CSRF endpoints that allows for state-changing operations.
1: GET /dashboard/moderation/1/approve
2: GET /requests/1/accept
3: GET /requests/1/reject
4: GET /requests/1/unclaim
5: GET /requests/1/reset
Proof of Concept
<a href="https://[UNIT3D-URL]/dashboard/moderation/1/approve">CLICK ME!</a>
Impact
This vulnerability is capable of tricking admin users to accept / reject / unclaim / reset requests and admin users to approve stuff.
Occurrences
web.php L244
requests accept api
web.php L250L251
requests unclaim / reset api
web.php L785
moderation api
request.blade.php L291L293
requests accept blade
web.php L247
requests reject api
request.blade.php L295L299
requests reject blade
request.blade.php L207L213
requests unclaim blade
request_modals.blade.php L87L100
requests reset blade
index.blade.php L55L62
moderation blade