CSRF : Reset API
Low
W
Weblate
Submitted None
Actions:
Reported by
jaypatel
Vulnerability Details
Technical details and impact analysis
**Description :**
Attacker can force to victim for reset his API.
**That HTTP Request :**
```
GET /accounts/reset-api-key/ HTTP/1.1
Host: hosted.weblate.org
Connection: close
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Referer: https://hosted.weblate.org/
Accept-Encoding: gzip, deflate, sdch, br
Accept-Language: en-US,en;q=0.8
Cookie: cookie_here
```
**Fix :**
Make that Request POST , and add a CSRF token there.
Best Regards',
Jay Patel
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-Site Request Forgery (CSRF)