lack-of-input-validation

1 article
sort: new top best
clear filter
0 8/10

A researcher discovered a chained CSRF vulnerability chain (4 requests) in a user management system's CSV import functionality that allowed unauthenticated account takeover by uploading a malicious CSV file without CSRF tokens, escalating to system admin privileges. The attack exploited timing delays between import steps and lack of CSRF protection on all four endpoints (file upload, job view, verification, and submission).

HackerOne A Bug'z Life
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details