Cross-Site Request Forgery (CSRF) in collectiveaccess/pawtucket2
Reported on
Oct 4th 2021
Description
After taking a look at the application again, I found few more (create / update) endpoints which should have CSRF protection
Proof of Concept
http://[PAWTUCKET-URL]/pawtucket/index.php/Lightbox/saveUserGroup?name=123&description=abc&group_id=
http://[PAWTUCKET-URL]/pawtucket/index.php/Lightbox/ajaxSaveSetInfo?name=abc&description=&set_id=
http://[PAWTUCKET-URL]/pawtucket/index.php/Lightbox/saveShareSet?group_id=15&user=&access=2
Impact
This vulnerability is capable of tricking user to create / modify new lightbox and user groups and add unauthorized users to lightbox
Occurrences
LightboxController.php L848-L904
Save User Group (validation)
LightboxController.php L434-L523
Save Set Info (validation)
LightboxController.php L675-L822
Save Share Set (validation)
There are others too. Fix covers additional endpoints... I think this is everything. (Should've done this to begin with, but time is short).
Yep looks like those are everything, apologies for missing out SetAccess. Could you validate this report?