Cross-Site Request Forgery (CSRF) in e107inc/e107

Valid

Reported on

Dec 25th 2021


Description

Hi e107 team, I would like to report a CSRF in e107 source code. This is in install plugin feature

Proof of Concept

  1. Install a local instance of e107
  2. Login as admin and access this link /e107_admin/plugin.php?mode=installed&action=install&path=chatbox_menu
  3. See that the pluglin chatbox menu is intalled.

Impact

This vulnerability is capable of CSRF

We are processing your report and will contact the e107inc/e107 team within 24 hours. a month ago
We have contacted a member of the e107inc/e107 team and are waiting to hear back a month ago
We have sent a follow up to the e107inc/e107 team. We will try again in 7 days. a month ago
Cameron validated this vulnerability a month ago
M0rphling has been awarded the disclosure bounty
The fix bounty is now up for grabs
Cameron confirmed that a fix has been merged on 7de11e 25 days ago
Cameron has been awarded the fix bounty
plugin.php#L1018 has been validated