Closed Bug 1764699 Opened 3 years ago Closed 3 years ago

CSRF in choosing solution in support.mozilla.org

Categories

(support.mozilla.org :: General, task)

Tracking

(Not tracked)

RESOLVED DUPLICATE of bug 1761746

People

(Reporter: haxatron1, Unassigned)

References

()

Details

(Keywords: reporter-external, Whiteboard: [reporter-external] [web-bounty-form] [verif?])

It is possible to trick the original question owner into choosing a solution to the problem via CSRF

POC:

  1. Create a question
  2. Answer the question, note the answer ID in the fragment of the URL after you answered the question. For example, for https://support.allizom.org/en-US/questions/1207236#answer-1082775, the answer ID is 1082775.
  3. If a question owner clicks on the URL via a CSRF attack - https://support.allizom.org/en-US/questions/[Question]/solve/[Answer-ID], they will unknowingly answer the question.
Flags: sec-bounty?

(In reply to haxatron1 from comment #0)

It is possible to trick the original question owner into choosing a solution to the problem via CSRF

POC:

  1. Create a question
  2. Answer the question, note the answer ID in the fragment of the URL after you answered the question. For example, for https://support.allizom.org/en-US/questions/1207236#answer-1082775, the answer ID is 1082775.
  3. If a question owner clicks on the URL via a CSRF attack - https://support.allizom.org/en-US/questions/[Question]/solve/[Answer-ID], they will unknowingly answer the question.
  1. If a question owner clicks on the URL via a CSRF attack - https://support.allizom.org/en-US/questions/[Question-ID]/solve/[Answer-ID], they will unknowingly choose a solution

An attacker can use this to trick a user into choosing their answer.

Status: UNCONFIRMED → RESOLVED
Closed: 3 years ago
Component: Other → General
Product: Websites → support.mozilla.org
Resolution: --- → DUPLICATE

Hello,

Thank you for your report.

Unfortunately, we already received a report about the same issue and we are working on addressing it.

Thanks,
Frida

Flags: sec-bounty? → sec-bounty-
Group: websites-security
You need to log in before you can comment on or make changes to this bug.