CSRF Vulnerability Identified in Booked Scheduler 2.5.15
Advisory by Netsparker (now Invicti)
Name: CSRF Vulnerability in Booked Scheduler 2.5.15
Affected Software: Booked Scheduler
Affected Versions: 2.5.15 and possibly below
Vendor Homepage: https://www.bookedscheduler.com
Vulnerability Type: Cross-site Request Forgery
Invicti Advisory Reference: NS-15-018
By exploiting a Cross-site Request Forgery (CSRF) vulnerability the attacker can mount any of the actions that can be done by the user such as adding a user, modifying content, deleting data. All the functionality that’s available to the victim can be used by the attacker. The only exception to this rule is a page that requires extra information that only the legitimate user can know (such as the user’s password).
Proof of Concept for CSRF in Booked Scheduler 2.5.15:
POST /phpsch/Web/admin/manage_users.php?action=addUser&uid= HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
For more information on cross-site scripting vulnerabilities, see Cross-site Request Forgery (CSRF).
15/09/2015 – First Contact
24/09/2015 – Vendor Fixed
09/11/2015 – Advisory Released
Credits & Authors
These issues have been discovered by Omar Kurt while testing Invicti Web Application Security Scanner.
Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.