Loading HuntDB...

CSRF - Modify Project Settings

Critical
S
Stripo Inc
Submitted None
Reported by ahmd_halabi

Vulnerability Details

Technical details and impact analysis

Cross-Site Request Forgery (CSRF)
**Target Url/Endpoint** https://my.stripo.email/cabinet/stripeapi/v1/projects/{Project_Id} **Note** Attacker just need to know victim project Id. ## Summary: This CSRF Vulnerability leads to change user's project settings including General Information, Contacts, Social Networks and Other Options. ## Steps To Reproduce: This POC is a simple example on exploiting this bug. Attacker can exploit it with more advanced techniques and can really lead to critical issues. 1. Navigate to Project Settings -> Modify any data and intercept the request, send it to repeater, and do the following. 2. Take the HTML code format from burp suite -> Engagement Tools -> Generate CSRF POC. 3. Put the piece of code in an html file, then open it. 4. Now hit on the button and intercept its request. 5. Change POST to PATCH. 6. Copy the patch data from the old intercepted request from repeater and paste it to the current intercepted request and modify the data (email for example). 7. Modify the request header of Content-Type: `Content-Type: application/json;charset=UTF-8` 8. Forward the request and CSRF exploited successfully and the modified data changed successfully :) ## Supporting Material/References: Please See this video where I recorded the above PoC in details ██████ ## Impact This attack can be exploited in advanced way to modify all project settings and manipulate its data. Smart attacker can gain a big advantage from this bug. Hope you fix it asap. **Regards**

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-Site Request Forgery (CSRF)