CSRF to change the email id in ikus060/rdiffweb
Reported on
Sep 21st 2022
Description
The change email ID is vulnerable to CSRF. The attacker can change the email ID of the user.
Proof of Concept
1.Login into the application https://rdiffweb-demo.ikus-soft.com.
2.Open the URL https://rdiffweb-demo.ikus-soft.com/prefs/general?username=admin&email=csrf%40test.com&action=set_profile_info
.
3.The email ID of the user is changed.
4.The email ID is changed.
Impact
This could change the email ID of the user.
@irfansayyed-github Plz adjust the affected version. 2.5 is not release. It's only affecting 2.4.6 and earlier.
@irfansayyed-github May you also update the registry.
Thanks
Could you also reply on this https://huntr.dev/bounties/7b6ec9f4-4fe9-4716-8dba-3491ffa3f6f2/
@irfansayyed-github plz adjust the registry from npm to pypi.
@admin Could you change the registry from nmp to pypi.
Thanks