Topic #3151 (no title)
0 guests and 0 members have recently viewed this.
The top 3 point earners from 14th Dec 2025 to 21st Dec 2025.
| PDStig |
|
|
|---|---|---|
| Gabri |
|
|
| sholzy |
|
|
There are no events at this time
#2072 - Cross-site Request Forgery (CSRF) Vulnerability in Composr 9.0.21
When you post an issue there is a field to say whether it is public or private.
That said, I don't believe there is a security hole here. Composr does referer checks. Where are you executing the malicious HTML from? If you uploaded it to the server to run (localhost in your case), then the hacker would not normally have access to do this.
Additionally, the target would have had to authorise a new session, a stale cookie login would not be enough.
I will do some checks to confirm that the referer check is working from a non-HTTP[S] context.
I will run more tests for a possible fix.
1) Yes, actually this is a legitimate issue
2) We have an issue with our tracker process for private issues, likely we need to configure to allow anonymous users to post such issues
Thanks for your report.
Locally it was not thought such an issue because JS execution is blocked for local HTML (needed for automatic form submission). However testing shows this is not actually the case, only IE prevents this.
This fix adds checks for blank referers if it has found that particular browser has had referers before.
It is important to note when re-testing that one native click within the system is needed for the "has_referers" cookie to get set. In any realistic attack scenario this would already have happened.
The fix cannot protect if some kind of firewall is always stripping out referrer headers. However we already advise against allowing such scenarios in our documentation.
The fix cannot protect if cookies are being blocked.
In any case the attack only works if targeted against an actively logged in browser session (not just having login cookies saved).
Our v10 is adding optional post tokens. We haven't done these in earlier versions as they make customisation much harder for people, while referer checks are stabler in a broaden set of customisation scenarios. But for v10 they will be there and optional.
http://compo.sr/site/news/view/chris_grahams_blog/security-fix-for-csrf.htm