This report contains the CSRF and XSS vulnerabilities found in electerious' Lychee. And there is a relationship between them.
First, an attacker can trick an administrator into opening a link to create an album containing the title of the malicious code by constructing a form form, and implement the XSS effect by accessing the get interface.
Details
Lychee is an open source project on GitHub.
The CSRF vulnerability exists when Albums are created without proper request validation, and an attacker can trick a user (administrator) into opening a link containing a malicious form to create a new album.
The title of the album has an XSS vulnerability, so the code is executed when the administrator accesses the page generated by the get interface.
The attacker to save the POC HTML file as https://www.attack.com/csrftest.html, logged-in users (administrator) will open the page to create a new album called csrftest.
The attacker will POC in https://www.attack.com/1.html, the logged in user (administrator) will be sent to you by Albums: : Add function to create a new album title contain malicious code.
The attacker put the POC in https://www.attack.com/2.html, logged-in users (administrator) to trigger an XSS vulnerability through access to Albums::get function.
Impact
The attacker can exploit the CSRF vulnerability to trick administrators into creating Albums with titles that contain malicious code, resulting in an XSS vulnerability.
Summary
This report contains the CSRF and XSS vulnerabilities found in electerious' Lychee. And there is a relationship between them. First, an attacker can trick an administrator into opening a link to create an album containing the title of the malicious code by constructing a form form, and implement the XSS effect by accessing the get interface.
Details
Lychee is an open source project on GitHub. The CSRF vulnerability exists when Albums are created without proper request validation, and an attacker can trick a user (administrator) into opening a link containing a malicious form to create a new album. The title of the album has an XSS vulnerability, so the code is executed when the administrator accesses the page generated by the get interface.
Proof of Concept (POC)
CSRF POC
The attacker to save the POC HTML file as https://www.attack.com/csrftest.html, logged-in users (administrator) will open the page to create a new album called csrftest.
XSS POC
The combined exploitation chain of these two vulnerabilities
The attacker will POC in https://www.attack.com/1.html, the logged in user (administrator) will be sent to you by Albums: : Add function to create a new album title contain malicious code.
The attacker put the POC in https://www.attack.com/2.html, logged-in users (administrator) to trigger an XSS vulnerability through access to Albums::get function.
Impact
The attacker can exploit the CSRF vulnerability to trick administrators into creating Albums with titles that contain malicious code, resulting in an XSS vulnerability.