A bug bounty researcher discovered a complete CSRF protection bypass on a major crypto exchange's Django-based admin panel. The vulnerability stemmed from the server validating CSRF tokens only by format and length (32 characters) rather than cryptographically verifying them against Django's SECRET_KEY. Any matching

7m read timeFrom infosecwriteups.com
Post cover image
Table of contents
IntroductionThe TargetUnderstanding CSRF — The BasicsThe DiscoveryWhy Does This Happen?Testing Multiple Arbitrary StringsThe Real-World ImpactGet Hacker MD ’s stories in your inboxReporting the VulnerabilityThe Outcome — The Hard LessonWhat I LearnedTechnical Takeaway — How Django CSRF Should WorkFinal Thoughts

Sort: