-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Possibly a bug? #649
Comments
Hey @yamerooo123 thanks for taking the time to dig in and find problems!
|
Ah, my bad, I mistook Session Storage for Cookies when inspecting. Yes, you're right, the web app doesn't need a CSRF token since it is session-based and not cookie-based. I will continue to find more bugs and vulnerabilities and report to you via this issue as soon as i found one. |
@yamerooo123 Thanks for making the video - would you be able to upload debug logs for the server of those requests going through? |
@yamerooo123 Do you have matrix (if so, are you able to message me at |
@yamerooo123 I have hopefully resolved the issue you discovered in the next release coming out shortly. I hope you don't mind, I deleted your comments as to not let any malicious people easy find out how to exploit the issues so easily. If you are free to test this after the release I would be very greatful. Thank you very much for your research into this! I should probably make a more secure way for discussing security issues in the future. |
Yes. I would be glad to help you test with the new version. You can use GitHub security tab to make a secure communication for security researchers to report vulnerabilities to prevent public disclosure as well. In addition, your web app is bulletproof to SQL injection and actually is well implemented. Since your web app is heavily rely on API resources and sessions, I would make those the first priority when it comes to security issues. Also, I have a small favor, I would like to request a CVE for this finding( only the recent one). CVE will help users to understand and advise them to upgrade to the latest version to patch the vulnerabilities. It is also quite common for many open-source softwares or applications to have CVE assigned too. Everything will be kept secret until the vulnerability has been patched. Preliminarily, if I find more vulnerabilities, I will contact you via @IRHM:matrix.org to prevent public disclosure. Have a day! |
@yamerooo123 If it lets you make a CVE, please feel free, I hadn't thought of it, but if it helps alert people to upgrade then that sounds good (not sure if I have to make it?). I had a look through the releases, it looks like the vulnerability has been present since Thank you! |
FINAL UPDATE I THINK I FOUND THE CULPRIT! IT IS /DATA! I undestand this folder is designed to be accessed only to high privileged users (sudo privilege) as it containing sensitive data which is why when JWT try to read JWT_SECRET, it couldn't retrieve because it lacks the privilege! Your code is solid but it has to do with Design Flaw . I retested it with jwt.io using a blank password. Now i couldn't craft JWT token anymore. This security flaw had me whole afternoon to figure it out. 😆 You do not have to do it, as a security reseacher i will take care of it for you! |
Hello,
I'm a security research. I perform a security testing on open-source projects for free.
Bug
Vulnerabilities
2. Lack of CSRF in Change password function: Without CSRF protection, adversaries could exploit the lack of verification for state-changing requests (like changing a password). This could allow an attacker to trick a logged-in user into making a request to change their password by embedding a request in a malicious site or email.Mitigation:
2. If possible, implement CSRF protection in functions that required authenticated users to interact.If you need more information please let me know.
Have a nice day!
The text was updated successfully, but these errors were encountered: