We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Describe the bug A malformed GET request at http://192.168.56.106/cacti/auth_profile.php?action=edit can lead to admin email change.
Affected URI http://192.168.56.106/cacti/auth_profile.php?action=edit
To Reproduce Steps to reproduce the behavior:
Malformed Request: http://192.168.56.106/cacti/auth_profile.php?tab=general&action=update_data&name=email_address&value=attacker@abc.com
Expected behavior Such actions should not be requested with GET method and anti-CSRF tokens should be used.
The text was updated successfully, but these errors were encountered:
This should be blocked.
Sorry, something went wrong.
Fixing Issue #3342
107bfec
CSRF at Admin Email
This should be fixed now.
Fixing Issue #3343 and outstanding issue with #3342
25abe64
No branches or pull requests
Describe the bug
A malformed GET request at http://192.168.56.106/cacti/auth_profile.php?action=edit can lead to admin email change.
Affected URI
http://192.168.56.106/cacti/auth_profile.php?action=edit
To Reproduce
Steps to reproduce the behavior:
Malformed Request:
http://192.168.56.106/cacti/auth_profile.php?tab=general&action=update_data&name=email_address&value=attacker@abc.com
Expected behavior
Such actions should not be requested with GET method and anti-CSRF tokens should be used.
The text was updated successfully, but these errors were encountered: