CVE-2024-7459

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in OSWAPP Warehouse Inventory System allows attackers to trick authenticated users into performing unintended actions by visiting malicious web pages. It affects all users of OSWAPP Warehouse Inventory System versions 1.0 and 2.0 with the vulnerable /edit_account.php endpoint accessible.

💻 Affected Systems

Products:
  • OSWAPP Warehouse Inventory System
Versions: 1.0 and 2.0
Operating Systems: Any OS running the web application
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the /edit_account.php endpoint accessible are vulnerable. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify user accounts, change passwords, or alter system settings by tricking administrators into clicking malicious links while authenticated.

🟠

Likely Case

Attackers could modify regular user account details or perform limited administrative actions depending on the victim's privileges.

🟢

If Mitigated

With proper CSRF protections, the attack would fail as requests would require valid anti-CSRF tokens.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires victim to be authenticated and visit a malicious page. The attack is simple to execute with basic web development knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider implementing CSRF protection manually or migrating to a supported system.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to all form submissions and validate them server-side

Manual code modification required - add unique token generation and validation to /edit_account.php and related forms

SameSite Cookie Attribute

all

Set SameSite=Strict or SameSite=Lax on session cookies to prevent cross-site requests

Set-Cookie: session_id=value; SameSite=Strict; Secure; HttpOnly

🧯 If You Can't Patch

  • Implement WAF rules to detect and block CSRF attempts
  • Restrict access to /edit_account.php to specific IP ranges or require re-authentication for sensitive actions

🔍 How to Verify

Check if Vulnerable:

Check if /edit_account.php accepts POST requests without CSRF token validation by testing with tools like Burp Suite or manually submitting forms without tokens.

Check Version:

Check application version in admin panel or source code headers. No standard command available.

Verify Fix Applied:

Test that all form submissions to /edit_account.php require and validate unique CSRF tokens that cannot be reused or predicted.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed form submissions from same IP
  • Requests to /edit_account.php with missing or invalid tokens
  • Unusual account modification patterns

Network Indicators:

  • HTTP POST requests to /edit_account.php without Referer headers matching origin
  • Requests with predictable or missing CSRF tokens

SIEM Query:

source="web_logs" AND uri="/edit_account.php" AND (NOT csrf_token=* OR csrf_token="") | stats count by src_ip

🔗 References

📤 Share & Export