Cross-Site Request Forgery (CSRF) in ampache/ampacheValid
Jul 24th 2021
When you don't set the SameSite attribute of cookies the browsers have special act in front of this issue.(I mean set default value on it) chrome and chromium based browsers set the attribute "Lax" that mean if you do add/delete/alter operation in a get HTTP request then your site more vulnerable with CSRF attacks.
But Firefox ( one of big ones ) don't set this attribute to "Lax" and set it to "none" that makes all POST and GET requests more Vulnerable to CSRF attack.
demo.apache.dev you don't set any SameSite attribute for your cookies.
develop.ampache.dev also you set SameSite attribute for all cookies to "Strict" that is good but for main session cookie that name "ampache" you didn't set any SameSite attribute.
So in Firefox attacker can delete any Smart Playlist without user's permission With CSRF attack that users already allowed manually do it.
🕵️♂️ Proof of Concept
<html> <body> <script>history.pushState('', '', '/')</script> <form action="https://develop.ampache.dev/server/ajax.server.php?page=browse&action=delete_object&type=smartplaylist&id=20" method="POST"> <input type="submit" value="Submit request" /> </form> </body> </html>
Here the attacker should knows the
id parameter's value to preform attack. Then attacker could delete any Smart Playlist.
This vulnerability is capable of delete any Smart Playlist without user's permission that have high impact on availability of user interactions.
You should set SameSite attribute to Lax and don't use Get method for writing, Or use strict if you don't want to share cookies to any third party application.