Advertisement






MYBB HTML Form Without CSRF Protection

CVE Category Price Severity
N/A CWE-352 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2019-12-01
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019120001

Below is a copy:

MYBB HTML Form Without CSRF Protection
Author : Gaddar ~ Turkish Vulnerability Researcher
Tested On : Kali Linux/Opera Browser
Local : Yes
Team : Yer6Sec Turkish Security Crew

Vulnerability Description ;
 This alert may be a false positive, manual confirmation is required.

 Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website whereby unauthorized 
 commands are transmitted from a user that the website trusts. 

 Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the affected HTML form.
 This vulnerability affects /forumdisplay.php (c665df4242c1a82f6a9aa0a0d24afa6a). 

Request
GET /forumdisplay.php?fid=2 HTTP/1.1
Pragma: no-cache
Cache-Control: no-cache
Referer: https://www.targetsite.com/forumdisplay.php
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: __cfduid=d8286188354df2224659ab6e9929e718f1575228127; mybb[lastvisit]=1575228126; mybb[lastactive]=1575228128; sid=9289656bb25617f993170ad3da2d9291
Host: www.wmduragi.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
Accept: */*

Response
HTTP/1.1 200 OK
Date: Sun, 01 Dec 2019 19:22:09 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
Set-Cookie: mybb[lastactive]=1575228129; expires=Mon, 30-Nov-2020 19:22:09 GMT; path=/; domain=.targetsite.com
CF-Cache-Status: DYNAMIC
Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
Server: cloudflare
CF-RAY: 53e76da1cfb372c3-AMS
Original-Content-Encoding: gzip
Content-Length: 19188

CWE CWE-352 
CVSS Base Score: 2.6 - AV:N/AC:H/Au:N/C:N/I:P/A:N 
 Access Vector: Network 
 Access Complexity: High 
 Authentication: None 
 Confidentiality Impact: None 
 Integrity Impact: Partial 
 Availability Impact: None 

How to fix this vulnerability
Check if this form requires CSRF protection and implement CSRF countermeasures if necessary.

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum