Cross-Site Request Forgery (CSRF) in e107inc/e107

Valid

Reported on

Dec 25th 2021


Description

Hi e107 team, I would like to report a CSRF in e107 source code. This is in install plugin feature

Proof of Concept

  1. Install a local instance of e107
  2. Login as admin and access this link /e107_admin/plugin.php?mode=installed&action=install&path=chatbox_menu
  3. See that the pluglin chatbox menu is intalled.

Impact

This vulnerability is capable of CSRF

We are processing your report and will contact the e107inc/e107 team within 24 hours. a year ago
We have contacted a member of the e107inc/e107 team and are waiting to hear back a year ago
We have sent a follow up to the e107inc/e107 team. We will try again in 7 days. a year ago
Cameron validated this vulnerability a year ago
M0rphling has been awarded the disclosure bounty
The fix bounty is now up for grabs
Cameron marked this as fixed in 2.3.2 with commit 7de11e a year ago
Cameron has been awarded the fix bounty
This vulnerability will not receive a CVE
plugin.php#L1018 has been validated
to join this conversation