CSRF at Self-close report function


Report #5cb67624-6648-4c87-81f2-691130f95bd7 in Hackrate Responsible Disclosure Program

Disclosed Report
StatusClosed
Resolved
TargetTier 1
bugbounty.hr443.com
Severity
Low
Details
Program
Hackrate Responsible Disclosure Program
Target
bugbounty.hr443.com
Creation Date
5/17/2021 2:08:35 PM
Severity
Low
CVSS Score

None

CVE Number
None
Visibility
Disclosed
Disclosed at
12/29/2025 5:38:12 PM
Author
@Labda
Status
Resolved (Closed)
Vulnerability Type
Cross Site Request Forgery
Summary

It's important to note, that the lack of CSRF protection is generally out of scope, but I reported it, because this request is just a simple GET method.

An attacker is able to craft an URL, what contains the ID of a report, and if the user, who has access to the report, clicks on it, the report is being self closed.

Description

To reproduce the issue, please follow the steps below:

1; Register a user 2; Submit a report at the test site 3; After submission, the report receives a unique(incremental) identifier 4; Craft the malicious URL : https://hckrt.com/Reports/SelfClose?report={REPORTID} 5; Open the URL above, and the submission has been self-closed.

Impact

If an attacker enchances the above link with an URL shortener function, or some type of open redirect issue, a targeted attack is easy to carry out against the hackers at H4ckr4t3, and the workflow of a report submission and lifecycle can be affected.

Timeline
Labda

Created.

Monday, May 17, 2021 2:08 PM
elliot

Changed to Accepted (Open)

Monday, May 17, 2021 5:15 PM
elliot

Changed to Resolved (Closed).

Tuesday, May 18, 2021 5:17 AM
Hackrate

Our platform helps companies to identify software vulnerabilities in a cost-efficient way. It provides a secure and centralized view of ethical hacking projects for your company.

US Patent Applied for HackGATE #63/645,845

Checking service status...

Capterra G2 Rating

Hackrate Ethical Hacking Platform |
2025 ©