zrlog icon indicating copy to clipboard operation
zrlog copied to clipboard

CSRF in backstage management

Open Al1ex opened this issue 4 years ago • 0 comments

This version of the zrlog backstage management has CSRF vulnerability.The attacker can induce the user to visit the CSRF attack page, and then use the user's credentials for malicious operations such as adding, deleting, modifying and checking 1、Login to the backstage as the admin; image 2、Create a new Bolg: image 3、Delete new blog and use burpsuite to grab package image 4、Constructing CSRF payload with burpsuite image 5、Drop the grab package and refresh the pag to sure the new blog is still existence: image 6、Using CSRF payload generated by burpsuite to construct CSRF HTML page image 7、Simulate blogger to visit CSRF attack page and click button image 8、From the displayed results, it is successfully deleted image 9、Refresh the page, delete the new blog successfully, CSRF attack successfully image

Suggestion: the whole station uses csrftoken for safety protection

Al1ex avatar May 31 '20 15:05 Al1ex