Web Hacking
◾
417
utf8=
✓
&_method=put&
authenticity_token=B6PJGp2Hkm1zi6lVN/IueNd7QqlAhIfM5C1pht1MzE8=&user[id] = 8092
44&user[badging_exempted]=0&user[receive_badge_email]=0
As you can clearly see, the authenticity token is being sent with the POST request followed by
other
parameters, which include the user’s ID and other form parameters. The researcher removed
the CSRF token and submitted the form, and the request succeeded.
The final proof of concept to demonstrate the vulnerability is as follows:
$file = $_GET["file"];
include($file.".html");
Dostları ilə paylaş: