mirror of
https://github.com/ciur/papermerge.git
synced 2026-04-25 03:55:58 +03:00
[GH-ISSUE #390] Potential security issue #305
Labels
No labels
2.1
3.0
3.0.1
3.0.2
3.0.3
3.0.3
3.1
3.2
3.2
3.3
3.5
3.x
Fixed. Waiting for feedback.
Fixed. Waiting for feedback.
UX
Version 2.1 - alpha
XSS
announcement
beta
blocker
bug
cannot reproduce
confirmed
confirmed
critical
demo
dependencies
deployment
detchnical debt
discussion
docker
documentation
donations
duplicate
enhancement
feature request
frontend
fundraising
good first issue
good issue
help wanted
high
implemented
important
improvement
incomplete
invalid
investigation
kubernetes
low
low impact
medium
medium
medium impact
migration from 2.0
migration from 2.1
missing-language
missing-ocr-language
no-activity
note
ocr
outofscope
packaging
performance
popular request
pull-request
pypi
question
raspberry pi
roadmap
search
security
setup
status
task
technical debt
updates
user xp
version 1.4.0 - demo
will be implemented
will not be implemented
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/papermerge#305
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @goiiot on GitHub (Jun 16, 2021).
Original GitHub issue: https://github.com/ciur/papermerge/issues/390
Originally assigned to: @ciur on GitHub.
Hello,
A potential security issue was found in this repository and was reported via huntr.
Kindly look into the issue here and validate it.
This link is private and will be only accessible to the project maintainers.
Thanks!
@ciur commented on GitHub (Jun 16, 2021):
@oomb, thank you for opening this issue. I will have a look.
@ciur commented on GitHub (Jun 16, 2021):
Here is how to reproduce the vulnerability issue:
Example of phishing email:
To mitigate the problem either use less predictable document ID's (e.g. UUID) or use csrf tokens.
@l4rm4nd commented on GitHub (Jul 8, 2021):
@ciur: All requests within the Papermerge web application that trigger a sensitive action use a csrf token (either within POST data or as
X-CSRFTokenHTTP header), so I assume the CSRF middleware is correctly enabled and the application not susceptible to CSRF.E.g. creating a new application user:
An attacker without knowledge about the
csrfmiddlewaretokenis not able to conduct a CSRF attack.So the outlined problem is not really Cross-Site Request Forgery (CSRF) nor Insecure Direct Object Reference (IDOR).
So what is the impact of this:
So imho this is not really an issue at all.
Recommendation
@ciur commented on GitHub (Jul 10, 2021):
@l4rm4nd, thank you a lot for your detailed explanation. I will take care of the issue.