Skip to content
  • joubu's avatar
    Bug 16591: Fix CSRF in opac-memberentry · 779fa7c6
    joubu authored and Kyle M Hall's avatar Kyle M Hall committed
    
    
    If an attacker can get an authenticated Koha user to visit their page
    with the code below, they can update the victim's details to arbitrary
    values.
    
    Test plan:
    
    Trigger
    /cgi-bin/koha/opac-memberentry.pl?action=update&borrower_B_city=HACKED&borrower_firstname=KOHA&borrower_surname=test
    
    => Without this patch, the update will be done (or modification
    request)
    => With this patch applied you will get a crash "Wrong CSRF token" (no
    need to stylish)
    
    Do some regression tests with this patch applied (Update patron infos)
    
    QA note: I am not sure it's useful to create a digest of the DB pass,
    but just in case...
    
    Reported by Alex Middleton at Dionach.
    
    Signed-off-by: default avatarChris Cormack <chris@bigballofwax.co.nz>
    
    Signed-off-by: default avatarKatrin Fischer <katrin.fischer.83@web.de>
    
    Signed-off-by: default avatarKyle M Hall <kyle@bywatersolutions.com>
    779fa7c6