IV83657: Cross-site request forgery (CSRF) vulnerability

A CSRF attack forces an authenticated victim’s browser to send an unauthenticated request to a vulnerable web application, which then performs unauthorized action on behalf of the attacker. This issue has been identified in various places throughout the application. This APAR is meant specifically for the example below.

Steps to replicate:

  • 1. Set the KNOWN_REFERRER_LIST to the hostname.
  • 2. Restart the TRIRIGA application server.
  • 3. Navigate to Configure > People > Employees.
  • 4. Select any existing employee.
  • 5. Click on the Delete button and intercept the form.
  • 6. Change the “sNo” field in the form to that of another user.
  • 7. Save the form as an HTML file, and open it in the browser, where you are currently logged in to TRIRIGA.
  • 8. Submit the CSRF form and see that the other user is deleted.

[Admin: This post is related to the 03.16.16 post and 04.04.16 post about another cross-site request forgery (CSRF) attack vulnerability (IV82436).]

Continue reading


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s