Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Liberapay: Login CSRF : Login Authentication Flaw on https://liberapay.com/

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Liberapay: Login CSRF : Login Authentication Flaw on https://liberapay.com/


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vulners.com


image
Description: There is no csrf validation while logging in which leads to csrf. An attacker can craft an HTML page containing information to have the victim sign into an attacker's account, where the victim may add sensitive payment information to the attacker's new account assuming he/she is logged into the correct account, where in reality, the victim is signed into the attacker's account where the changes are visible to the attacker Steps to reproduce: 1-Login as Victim 2-Now as Attacker Go to Login page give attacker's email and an Account confirmation link will send to the attacker's email 3-Extract the value of id, Key and Token from the confirmation link and replace it in HTML File (POC) history.pushState('', '', '/') 4-Send the script to the Victim to make them click then Victim now logged in to the attacker's account (After some time victim account gets logged out without any warning) Note: The victim may add sensitive payment information to the attacker's new account and also Attacker can now see all activities of the victim including all sensitive information that the victim supplied to the account. Proof of concept: (video) {F1228371} Remediation: 1)When clicking on a signing link while you're already logged in, show a message like "You're already logged in as xxx. Do you want to sign in as yyy instead? 2)Limit CSRF tokens per IP, by including them in the token's payloads Impact 1)The victim may add sensitive... ...



๐Ÿ“Œ Liberapay: Login CSRF : Login Authentication Flaw on https://liberapay.com/


๐Ÿ“ˆ 83.89 Punkte

๐Ÿ“Œ csrf-magic up to 1.0.3 CSRF Protection $GLOBALS['csrf']['secret'] cross site request forgery


๐Ÿ“ˆ 30.58 Punkte

๐Ÿ“Œ Liberapay: Disavowed an email without any authentication


๐Ÿ“ˆ 27.49 Punkte

๐Ÿ“Œ Why do FOSS enthusiasts usually prefer Liberapay over Patreon?


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ Liberapay: a non-profit and open-source recurrent donations platform


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ Liberapay thrown out by Mangopay (but has new plans for the future)


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ Liberapay: Session Cookie without HttpOnly and secure flag set


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ [FOSS] Would you support developer on patreon/liberapay to create your ideas for apps and release them opensource?


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ Liberapay: Full Path disclosure on 500 error


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ Liberapay: Private target account appears in search results


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ The fourth year of Liberapay


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ Liberapay: Leaking Of Sensitive Information on Github


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ Liberapay: Failure to Invalid Session after Password Change


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ Liberapay: Disavowing an account doesn't disable it


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ Liberapay: Email Address Exposure via Gratipay Migration Tool


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ Liberapay: Twitter account hijack @Costalfy


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ Liberapay: Password Reset Token Leak Via Referrer


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ Liberapay: Avatar URL is exposed in patron export for secret donations


๐Ÿ“ˆ 21.73 Punkte

๐Ÿ“Œ CVE-2019-17590 | CSRF Magic Library up to 2016-03-27 CSRF Protection csrf_callback cross-site request forgery


๐Ÿ“ˆ 20.39 Punkte

๐Ÿ“Œ What Is CSRF? How Can We Prevent CSRF?


๐Ÿ“ˆ 20.39 Punkte

๐Ÿ“Œ D-Link DIR-600M 3.04 Admin Login login.cgi Password weak authentication


๐Ÿ“ˆ 17.97 Punkte

๐Ÿ“Œ [webapps] - KB Login Authentication Script 1.1 - Authentication Bypass


๐Ÿ“ˆ 17.62 Punkte

๐Ÿ“Œ [webapps] - KB Login Authentication Script 1.1 - Authentication Bypass


๐Ÿ“ˆ 17.62 Punkte

๐Ÿ“Œ Martin Bauer gBook 1.4 Authentication index.php login weak authentication


๐Ÿ“ˆ 17.62 Punkte

๐Ÿ“Œ The csrf bypass flaw has now been fixed, and the researcher who discovered it has netted $25,000.


๐Ÿ“ˆ 17.45 Punkte

๐Ÿ“Œ CSRF flaw in WordPress potentially allowed the hack of websites


๐Ÿ“ˆ 17.45 Punkte

๐Ÿ“Œ CVE-2022-38753 | NetIQ Advanced Authentication up to 6.3 Service Pack 4 Multi-Factor Authentication improper authentication


๐Ÿ“ˆ 17.28 Punkte

๐Ÿ“Œ WordPress Peter's Login Redirect 2.9.0 XSS / CSRF


๐Ÿ“ˆ 16.3 Punkte

๐Ÿ“Œ WordPress Peter's Login Redirect 2.9.0 XSS / CSRF


๐Ÿ“ˆ 16.3 Punkte

๐Ÿ“Œ Federated Login CSRF - AppSecUSA 2017


๐Ÿ“ˆ 16.3 Punkte

๐Ÿ“Œ Block WP Login <= 1.3.0 - CSRF and Unauthorised Option Update


๐Ÿ“ˆ 16.3 Punkte

๐Ÿ“Œ Peters Login Redirect <= 2.9.1 - Multiple CSRF


๐Ÿ“ˆ 16.3 Punkte











matomo