We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
There is also no filter for the token and referer check in the global filter, and there is no deletion method, so there is a CSRF vulnerability.
First use the A user (admin) to send a Weibo.
Use the B user (jeesns) to comment on the Weibo and bring the admin Weibo delete request.
<img src="http://localhost:8080/manage/weibo/delete/3">
When the A user (admin) refreshes the Weibo again, the Weibo will be deleted by the A user without their knowledge.
It can be seen that the CSRF TEST microblog has been deleted and the CSRF exploit is successful.
There is also a CSRF vulnerability when the background administrator adds a new administrator. The poc can be constructed this way.
<form action=http://localhost:8080/manage/member/managerAdd method=POST> <input type="text" name="name" value="jeesns" /> </form> <script> document.forms[0].submit(); </script>
When the background administrator accesses this file, the user jeesns is automatically authorized for administrative rights.
jeesns
The text was updated successfully, but these errors were encountered:
No branches or pull requests
There is also no filter for the token and referer check in the global filter, and there is no deletion method, so there is a CSRF vulnerability.
Vulnerability recurrence
First use the A user (admin) to send a Weibo.
Use the B user (jeesns) to comment on the Weibo and bring the admin Weibo delete request.
<img src="http://localhost:8080/manage/weibo/delete/3">
When the A user (admin) refreshes the Weibo again, the Weibo will be deleted by the A user without their knowledge.
It can be seen that the CSRF TEST microblog has been deleted and the CSRF exploit is successful.
There is also a CSRF vulnerability when the background administrator adds a new administrator. The poc can be constructed this way.
When the background administrator accesses this file, the user
jeesns
is automatically authorized for administrative rights.The text was updated successfully, but these errors were encountered: