Loading HuntDB...

[https://www.glassdoor.com] - Web Cache Deception Leads to gdtoken Disclosure

High
G
Glassdoor
Submitted None

Team Summary

Official summary from Glassdoor

A web cache deception issue was reported by @bombon For the exploit to trigger, the victim must be logged-in to Glassdoor and must also visit an attacker-controlled page that makes the victim hit the caching page, programmatically fetch the cached CSRF token (gdToken), and forge and send a request on the victim's behalf leading to CSRF attacks. We have resolved this by eliminating the caching of the CSRF token. Thanks, @bombon for the great find, and looking forward to more findings from you

Reported by bombon

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Information Disclosure