Exploit/Advisories

Published on October 8th, 2020 📆 | 4436 Views ⚑

0

Liman 0.7 Cross Site Request Forgery ≈ Packet Storm


https://www.ispeech.org

# Exploit Title: Liman v0.7 - Cross-Site Request Forgery (CSRF))
# Date: 10-07-2020
# Exploit Author: George Tsimpidas
# Software Link : https://github.com/salihciftci/liman/releases/tag/v0.7
# Version: 0.7
# Tested on: 18.04.5 LTS (Bionic Beaver)
# Category: Webapp

1. Description:-

There is no CSRF protection in Liman application, with a little help
of social engineering (like sending a link via email/chat) an attacker may
force the victim to click on a malicious link, with the purpose of
manipulating his current account information, or changing entirely his
password.

Vulnerable Endpoints :

- *http://127.0.0.1:5000/settings/profile
*
- *http://127.0.0.1:5000/settings/password
*

*Proof of Concept*

1.

Download the application, make an account and login inside the panel
under : http://127.0.0.1:5000 expose the docker port on 5000.

2.

Save this .html files and send it to victim (Victim should be
loggedin in the browser)

Crafted value will be added.





Account Information CSRF :




Password Change CSRF :





Source link

Tagged with:



Comments are closed.