Intro
Most of the web applications I see are kinda binary when it comes to CSRF protection; either they have one implemented using CSRF tokens (and more-or-less covering the different functions of the web application) or there is no protection at all. Usually, it is the latter case. However, from time to time I see application checking the Referer HTTP header.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
The OWASP Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet tells us that this defense approach is a baaad omen, but finding a universal and simple solution on the Internetz to strip the Referer header took somewhat more time than I expected, so I decided that the stuff that I found might be useful for others too.
Solutions for Referer header strip
Most of the techniques I have found were way too complicated for my taste. For example, when I start reading a blog post from Egor Homakov to find a solution to a problem, I know that I am going to:
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
- learn something very cool;
- have a serious headache from all the new info at the end.
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
<html>
<meta name="referrer" content="never">
<body>
<form action="https://vistimsite.com/function" method="POST">
<input type="hidden" name="param1" value="1" />
<input type="hidden" name="param2" value="2" />
...
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Conclusion
As you can see, there is quite a lot of ways to strip the Referer HTTP header from the request, so it really should not be considered a good defense against CSRF. My preferred way to make is PoC is with the meta tag, but hey, if you got any better solution for this, use the comment field down there and let me know! :)
Read more- Hacker
- Beginner Hacker Tools
- Hack And Tools
- Hacking Tools For Windows 7
- Computer Hacker
- Hacks And Tools
- Pentest Tools Review
- Hacker Tools 2020
- Pentest Tools For Mac
- Hacker Tools Mac
- Hacking Tools And Software
- Pentest Reporting Tools
- Hacker Tools Mac
- Hacking Tools
- Hacking Tools 2019
- Best Pentesting Tools 2018
- Hacking Tools For Windows
- Hacking Tools Windows
- Hacking Tools Name
- Hacker Tools Github
- Hacker Tools 2020
- Android Hack Tools Github
- How To Hack
- Physical Pentest Tools
- Install Pentest Tools Ubuntu
- Hacker Security Tools
- How To Install Pentest Tools In Ubuntu
- Hack Tools Mac
- Hacker Tools Hardware
- Pentest Automation Tools
- Pentest Tools For Windows
- Hacking Tools Hardware
- Hack Tools For Pc
- Pentest Tools For Android
- What Is Hacking Tools
- Hacker Tools Apk Download
- Pentest Recon Tools
- Pentest Tools Android
- Hack App
- How To Make Hacking Tools
- Nsa Hack Tools Download
- Pentest Tools Find Subdomains
- Hacking Apps
- Pentest Tools For Android
- Hack Tools For Games
- Hacker Security Tools
- Hacking Tools For Mac
- Usb Pentest Tools
- Hacker Tools Online
- Hack Tools
- Hack Tools Pc
- Hacking Tools Windows
- Hacker Tools For Windows
- Pentest Tools Download
- Hacker Tools 2020
- Pentest Tools Alternative
- Hacking Tools Windows 10
- Pentest Tools Find Subdomains
- Easy Hack Tools
- Hacking Tools Windows
- Hacker Tools Linux
- Hacking Tools Online
- Hacker Tools Hardware
- Ethical Hacker Tools
- Hacking Tools Usb
- Pentest Recon Tools
- Hack Tools For Pc
- Android Hack Tools Github
- Hacker Tools Software
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Tcp Port Scanner
- Hacking Tools For Windows Free Download
- Pentest Tools Tcp Port Scanner
- Hacker Tools Online
- Nsa Hacker Tools
- Hack Website Online Tool
- Beginner Hacker Tools
- Nsa Hacker Tools
- Hacking Tools Free Download
- How To Install Pentest Tools In Ubuntu
- Hacker Tools 2019
- Pentest Tools List
- Hacker Security Tools
- Tools For Hacker
- Hacking Tools Hardware
- Pentest Tools Bluekeep
- Android Hack Tools Github
- Free Pentest Tools For Windows
- New Hack Tools
- What Are Hacking Tools
- Hacking Tools Software
- Hacker Tools List
- Hacking Tools Pc
- Pentest Tools Tcp Port Scanner
- Hacker Tools Github
- Install Pentest Tools Ubuntu
- Free Pentest Tools For Windows
- Hacker Tools Mac
- How To Hack
- Ethical Hacker Tools
- Hacking Tools Download
- Pentest Tools Apk
- Pentest Tools Alternative
- Pentest Tools Framework
- Pentest Reporting Tools
- Hacking Tools For Kali Linux
- Hacker Tools 2020
- Tools 4 Hack
- Pentest Tools Subdomain
- Hacker Tools For Windows
- Hacking Tools And Software
- New Hack Tools
- Hacking Tools Windows 10
- Pentest Recon Tools
- Pentest Tools Download
- Hacker Tools 2020
- Nsa Hacker Tools
- Hacking Tools Windows 10
- Hacking Tools Download
- Pentest Tools Bluekeep
- Pentest Tools Download
- Hacking Tools Online
- Hack Tools Online
- Hacker Hardware Tools
- Pentest Tools Alternative
- Pentest Tools Website
- Hack Tools
- Underground Hacker Sites
- What Are Hacking Tools
- How To Hack
- Hacker Tools Windows
- Hacking Tools 2019
- Hacking Tools Download
- Install Pentest Tools Ubuntu
- Hacking Tools Hardware
- Hacker Tools For Ios
- Best Hacking Tools 2019
- What Is Hacking Tools
- Hacker Tools Apk
- Hack And Tools
- Hack Website Online Tool
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Free
- Hack Tool Apk
- Hack Tools For Mac
- Hack Tools For Windows
- Pentest Tools For Android
- Hack App
- Beginner Hacker Tools
- Nsa Hack Tools Download
- Pentest Tools Nmap
- What Is Hacking Tools
- Hacker Tools Github
- Hacker Tools Linux
- Hacking Tools For Pc
- Hacker Tools
- Pentest Tools Alternative
- Hack Tools Download
- Hacker Tools
- Pentest Tools Website Vulnerability
- Hack And Tools
- Pentest Automation Tools
- Hack Tool Apk No Root
- Hack Tools For Ubuntu
- Hacking Tools Github
- Hacking Tools For Games
- Hacker Tools Linux
- Hack Tools
- How To Hack
- Hacking Tools For Windows 7
- Hacker Tool Kit
- Termux Hacking Tools 2019
- Pentest Tools For Windows
- Top Pentest Tools
- Hack Tools For Pc
No hay comentarios:
Publicar un comentario