csrf bypass using flash file + 307 redirect method at plugins endpoint
Medium
S
Stripo Inc
Submitted None
Actions:
Reported by
qotoz
Vulnerability Details
Technical details and impact analysis
Hi Security team,
i have found that the request sent to https://my.stripo.email/cabinet/stripeapi/v1/plugin/$userid$/plugins don't have any protection against csrf attacks as the server only validates that the content type is application/json and this can be bypassed using the flash file + 307 redirect technique
Steps To Reproduce:
1. login to your account at https://my.stripo.email
2. visit https://thehackerblog.com/crossdomain/
3. use this link as php redirector https://testingsubdomain.000webhostapp.com/stripo.php
4. in the request headers : Content-Type: application/json;charset=UTF-8
5. the payload
```
{"email":"[email protected]","name":"csrf poc","webUrl":"csrf poc "}
```
##Watch the network traffic from the network tab on the Devtools
##and go back to and refresh the site you'll find all the application data have created
all these steps would be integrated together and performed by the attacker's server
i am attaching a poc video declaring the steps
{F671826}
##Supporting Material/References:
http://www.geekboy.ninja/blog/exploiting-json-cross-site-request-forgery-csrf-using-flash/
http://resources.infosecinstitute.com/bypassing-csrf-protections-fun-profit/#gref
https://blog.cm2.pw/forging-content-type-header-with-flash/
## Impact
attacker can send request to create an application in behalf of user
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-Site Request Forgery (CSRF)