lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <E1ChHD6-0001a9-Ta@virt1.clust1.firecluster.net>
Date: Thu, 23 Dec 2004 00:52:08 +0000
From: Tim Jackson <lists@...j.co.uk>
To: bugtraq@...urityfocus.com
Subject: Re: Security Advisory for ALL forum services with client-set images


On 22 Dec 2004, James Bandara wrote:

[rediscovering CSRF]

> A user could copy one of these links to delete his own thread, edit it
> so the querystring is for another users post, and post it up as a link
> or avatar.
> In effect if an admin sees the image or the original user sees it, it
> will instantly delete the post as its on the same site no extra login is
> needed.

What you've identified is part of a general class of similar problems and
was discussed quite extensively on this list back in summer 2001. Read the
thread starting here:

http://www.securityfocus.com/archive/1/191114

culminating in a comprehensive analysis by "Peter W" in which he names the
general problem "CSRF" (Cross-Site Request Forgeries):

http://www.securityfocus.com/archive/1/191390


Tim


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ