URL:
  <http://savannah.gnu.org/support/?107055>

                 Summary: XSRF
                 Project: Savannah Administration
            Submitted by: tajh
            Submitted on: Fr 09 Okt 2009 08:12:04 GMT
                Category: Trackers (bugs, support, tasks...)
                Priority: 5 - Normal
                Severity: 6 - Security
                  Status: None
             Assigned to: None
        Originator Email: 
        Operating System: None
             Open/Closed: Open
         Discussion Lock: Any

    _______________________________________________________

Details:

There seems to be a XSRF bug in the software, which allows attackers to
inject spam flaggings into savannah when savannah users visit the attackers
webpage, for example with the following code:
<img
src="https://savannah.gnu.org/support/index.php?func=flagspam&item_id=107054&comment_internal_id=0";>

Could someone please verify this and place a token into the URL, like it's
done on Wikipedia?




    _______________________________________________________

Reply to this item at:

  <http://savannah.gnu.org/support/?107055>

_______________________________________________
  Nachricht geschickt von/durch Savannah
  http://savannah.gnu.org/



Reply via email to