Agora logo
Welcome to Agora!
 → 

Recent posts of VignacSecond

« 1  [2]  »
VignacSecond
test
retest
VignacSecond
test
aaaaaaaaaaaaaaaa
VignacSecond
There is a flaw in the forum !! (CSRF)
Okay :)
VignacSecond
There is a flaw in the forum !! (CSRF)
VignacSecond
There is a flaw in the forum !! (CSRF)
Quote from: Wikipedia
Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf[1]) or XSRF, is a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts.[2] There are many ways in which a malicious website can transmit such commands; specially-crafted image tags, hidden forms, and JavaScript XMLHttpRequests, for example, can all work without the user's interaction or even knowledge. Unlike cross-site scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser.

In a CSRF attack, an innocent end user is tricked by an attacker into submitting a web request that they did not intend. This may cause actions to be performed on the website that can include inadvertent client or server data leakage, change of session state, or manipulation of an end user's account.


Example with Agora : [img]https://agora.evalyn.app/?action=promote&id=1527[/img]


How to solve it :
-You have to add
Code
if(isSet($_GET['as'])) if($_SESSION['actionSecret'] == $_GET['as'])
everywhere.
-Possibly a longer token, otherwise it would be "easy" to "bruteforce" by generating
VignacSecond
messages not working properly
Nice, You do a great job, thanks for your time.
Also, "Passwords must be at least 8 characters and no more than 72 characters long. Only letters, numbers, and most common ASCII special characters are allowed. Your password cannot begin or end with spaces." This rule is not respected when we want to change the password on our profile :/
« 1  [2]  »