You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cross-site request forgery(CSRF), also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Replace to post number which post you want to delete.
now open whatever.html via browser where you logged in with Subrion CMS
Click on Submit request button.
the post will delete automatically.
Impact
An attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application.
How to fix this vulnerability
Check if this form requires CSRF protection and implement CSRF countermeasures if necessary.
Because of inadequate permissions settings in this plugin, this vulnerability could only be exploited in case if currently logged in user is a member of administrators usergroup. Regarding the vulnerability itself, here really was no owner check. Both these issues have been fixed.
The fix has been included into automatic upgrade patch which has been released two days ago. It includes several security fixes as well. It uses the script's built-in critical upgrades feature and automatically applied to all the script installations.
Hi subrion security team,
Bug Description
Cross-site request forgery(CSRF), also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
Steps to reproduce
Impact
An attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application.
How to fix this vulnerability
Check if this form requires CSRF protection and implement CSRF countermeasures if necessary.
Regards,
Rudra Sarkar
rudrasarkar815@gmail.com
The text was updated successfully, but these errors were encountered: