Cross-Site Request Forgery (CSRF) in baijunyao/laravel-bjyblog


Reported on

Nov 7th 2021


Attacker is able to logout a user if a logged in user visits attacker website.


This vulnerability is capable of forging user to unintentional logout.


Tested on Edge, firefox, chrome and safari.


You should use POST instead of GET.

To expand:

One way GET could be abused here is that a person (competitor perhaps:) placed an image tag with src="<your logout link>" ANYWHERE on the internet, and if a user of your site stumbles upon that page, he will be unknowingly logged out.

This is why it should be a POST with a @csrf token.

While this cannot harm a users account it can be a great annoyance.

We are processing your report and will contact the baijunyao/laravel-bjyblog team within 24 hours. a year ago
We have contacted a member of the baijunyao/laravel-bjyblog team and are waiting to hear back 10 months ago
10 months ago


Fixed, thank you very much.

baijunyao validated this vulnerability 10 months ago
HDVinnie has been awarded the disclosure bounty
The fix bounty is now up for grabs
10 months ago


@baijunyao thanks

baijunyao confirmed that a fix has been merged on ec12f3 10 months ago
baijunyao has been awarded the fix bounty
to join this conversation