Exploiting CSRF chaining with IDOR
2023-2-6 15:35:49 Author: infosecwriteups.com(查看原文) 阅读量:14 收藏

Hola fellow researchers,

Myself, Rafi Ahamed. I am a Cyber Security Researcher from Bangladesh. I am a currently doing my BBA from University of Dhaka. But I do love nerdy stuffs. Let’s not waste any time & get down to our topic.

Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts.

Insecure direct object references (IDOR) are a type of access control vulnerability that arises when an application uses user-supplied input to access objects directly.

I was testing a NDA (Non-disclosure Agreement) program and I noticed that the Web Application had an option to delete the user’s account.

I intercepted the request using Burp to test for IDOR as I love finding IDORs. But I couldn’t find any numeric ID or anything identical to that. But there was a User ID parameter which contained the User Name of the user. I changed the User ID with my 2nd account’s User Name, but it didn’t work. Then I noticed that there wasn’t any CSRF token. So, I generated a CSRF PoC using Burp and opened the HTML document using my other account. But it didn’t work.

The CSRF document

Then I remembered that there was that User ID Parameter. I changed the User ID with my 2nd account’s User Name again. I opened the document with my 2nd account and my account was deleted.

The exploit

I quickly reported the bug and the company fixed the bug within 24hours.

The Developer

Hope you guys enjoyed this one. PM me at Facebook, LinkedIn or Twitter anytime if you have any questions.

#Eat_sleep_hack_repeat
#Hack’em all


文章来源: https://infosecwriteups.com/exploiting-csrf-chaining-with-idor-7617371ce6e3?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh