Closed oomb closed 9 months ago
@oomb, thank you for opening this issue. I will have a look.
Here is how to reproduce the vulnerability issue:
Example of phishing email:
<html>
<body>
To verify that you are a human, upload the file that has been downloaded from our website now.
<a href="https://demo.papermerge.com/node/11/download/">Download Test File</a>
</body>
</html>
To mitigate the problem either use less predictable document ID's (e.g. UUID) or use csrf tokens.
@ciur: All requests within the Papermerge web application that trigger a sensitive action use a csrf token (either within POST data or as X-CSRFToken
HTTP header), so I assume the CSRF middleware is correctly enabled and the application not susceptible to CSRF.
E.g. creating a new application user:
An attacker without knowledge about the csrfmiddlewaretoken
is not able to conduct a CSRF attack.
So the outlined problem is not really Cross-Site Request Forgery (CSRF) nor Insecure Direct Object Reference (IDOR).
So what is the impact of this:
So imho this is not really an issue at all.
Recommendation
@l4rm4nd, thank you a lot for your detailed explanation. I will take care of the issue.
Hello,
A potential security issue was found in this repository and was reported via huntr.
Kindly look into the issue here and validate it.
This link is private and will be only accessible to the project maintainers.
Thanks!