Loading HuntDB...

CSRF in account configuration leads to complete account compromise

O
OLX
Submitted None
Reported by cablej

Vulnerability Details

Technical details and impact analysis

Cross-Site Request Forgery (CSRF)
Hello, Although listed as out of scope, this vulnerability presents serious risk that can compromise any account, and hope you consider it as such. When updating a user in the configuration tab, there is no CSRF token to prevent other pages from updating the user. This allows any third party site to edit the user's email, then able to reset the password. POC: 1. Visit http://d214mfsab.org/olx.html while logged into your OLX account. This is a demo CSRF page I set up that changes your email to '[email protected]'. 2. Click 'Submit'. 3. The JSON response will be returned, showing that your email was changed. An attacker could then reset your password using the 'Forgot Password' feature and gain access to your account. Suggested fix: Require a CSRF token with all sensitive GET and POST requests.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-Site Request Forgery (CSRF)