URL:
<http://savannah.gnu.org/support/?107055>
Summary: XSRF
Project: Savannah Administration
Submitted by: tajh
Submitted on: Fr 09 Okt 2009 08:12:04 GMT
Category: Trackers (bugs, support, tasks...)
Priority: 5 - Normal
Severity: 6 - Security
Status: None
Assigned to: None
Originator Email:
Operating System: None
Open/Closed: Open
Discussion Lock: Any
_______________________________________________________
Details:
There seems to be a XSRF bug in the software, which allows attackers to
inject spam flaggings into savannah when savannah users visit the attackers
webpage, for example with the following code:
<img
src="https://savannah.gnu.org/support/index.php?func=flagspam&item_id=107054&comment_internal_id=0">
Could someone please verify this and place a token into the URL, like it's
done on Wikipedia?
_______________________________________________________
Reply to this item at:
<http://savannah.gnu.org/support/?107055>
_______________________________________________
Nachricht geschickt von/durch Savannah
http://savannah.gnu.org/