vendor:
Bravo Solution
by:
Arvind V.
8
CVSS
HIGH
Cross Site Request Forgery (CSRF)
352
CWE
Product Name: Bravo Solution
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: CVE-2018-7216
CPE: tejari
Platforms Tested:
2018
Bravo Tejari Web Portal-CSRF
The Web Interface of the Bravo Tejari procurement portal does not use random tokens to block any kind of forged requests. An attacker can take advantage of this scenario and create a forged request to edit user account details like name, address of the company/individual, email address etc. He then uses social engineering techniques to target specific individuals whose account details he would like to change. He simply sends the link and tricks the user into clicking the forged http request. The request is executed and user account details are changed without his knowledge.
Mitigation:
Implement random tokens to block forged requests and validate requests before making any changes to user account details. Educate users about the risks of clicking on unknown links or suspicious requests.