GET based CSRF on delete user functionality in wallabag/wallabag
Valid
Reported on
Feb 4th 2023
Description
The /account/delete
functionality is vulnerable to CSRF. In this way, an attacker can trick the victim to delete his own account just clicking on the link.
Steps to reproduce
- Login with a user
- Now go here:
https://app.wallabag.it/account/delete
- The account is now deleted without any confirmation
Impact
An attacker can trick the victim to delete his own account just clicking on the link.
Remediation
Convert it to a POST
request with CSRF token, or implement a CSRF token in the URL.
Occurrences
We are processing your report and will contact the
wallabag
team within 24 hours.
2 months ago
We have contacted a member of the
wallabag
team and are waiting to hear back
2 months ago
Thanks for the report. Could you fix the affected version? It should 2.5.3 instead of 3.5.3.
The researcher's credibility has increased: +7
Thanks for validating the report. Unfortunately, I can't change the version since I'm not allowed to change anything after report validation
ConfigController.php#L615
has been validated
Thank you @leorac
The researcher's credibility has slightly increased as a result of the maintainer's thanks: +1
to join this conversation