Intro
Most of the web applications I see are kinda binary when it comes to CSRF protection; either they have one implemented using CSRF tokens (and more-or-less covering the different functions of the web application) or there is no protection at all. Usually, it is the latter case. However, from time to time I see application checking the Referer HTTP header.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
The OWASP Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet tells us that this defense approach is a baaad omen, but finding a universal and simple solution on the Internetz to strip the Referer header took somewhat more time than I expected, so I decided that the stuff that I found might be useful for others too.
Solutions for Referer header strip
Most of the techniques I have found were way too complicated for my taste. For example, when I start reading a blog post from Egor Homakov to find a solution to a problem, I know that I am going to:
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
- learn something very cool;
- have a serious headache from all the new info at the end.
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
<html>
<meta name="referrer" content="never">
<body>
<form action="https://vistimsite.com/function" method="POST">
<input type="hidden" name="param1" value="1" />
<input type="hidden" name="param2" value="2" />
...
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Conclusion
As you can see, there is quite a lot of ways to strip the Referer HTTP header from the request, so it really should not be considered a good defense against CSRF. My preferred way to make is PoC is with the meta tag, but hey, if you got any better solution for this, use the comment field down there and let me know! :)
More information
- Hacking Tools For Windows 7
- Usb Pentest Tools
- Pentest Tools For Mac
- Pentest Automation Tools
- Hacking Tools Hardware
- Hacking Tools Download
- Pentest Tools Apk
- Hacker Tool Kit
- Hacking Tools For Windows 7
- Ethical Hacker Tools
- Pentest Tools Website Vulnerability
- Hacker Search Tools
- Hacking Tools Software
- Hack Tools Github
- Hacker Tools Software
- Pentest Tools Framework
- Hack Tools For Games
- Hack Tools For Games
- Hacking App
- Bluetooth Hacking Tools Kali
- Tools Used For Hacking
- Hacker Tools For Windows
- Hacking Tools Pc
- Hacking Tools
- Pentest Tools List
- Hacking Tools For Games
- Pentest Automation Tools
- Black Hat Hacker Tools
- Hacker Tools Apk
- Free Pentest Tools For Windows
- Pentest Automation Tools
- Hacking Tools For Games
- Install Pentest Tools Ubuntu
- Hacking Tools Name
- What Are Hacking Tools
- Beginner Hacker Tools
- Hacking Tools For Kali Linux
- Hacking Tools Github
- Termux Hacking Tools 2019
- Hacking Tools For Kali Linux
- Hack Tools For Ubuntu
- Hack Tools For Mac
- Physical Pentest Tools
- Nsa Hack Tools
- Hacker
- Top Pentest Tools
- Hacker Tools Mac
- Hacker Tools Mac
- Tools Used For Hacking
- Hacking Tools 2020
- Pentest Tools Url Fuzzer
- Pentest Tools Linux
- Hacking Tools And Software
- Hacking Apps
- Hacker Tools Free Download
- Beginner Hacker Tools
- World No 1 Hacker Software
- Hacker Tools For Ios
- Hacking Tools Pc
- Hacking Tools Windows
- Hack Apps
- Black Hat Hacker Tools
- Hacker Tools Apk Download
- Hacking Apps
- Pentest Tools Find Subdomains
- Hack Tools For Windows
- Hack Tools For Games
- Pentest Tools Tcp Port Scanner
- Tools 4 Hack
- What Is Hacking Tools
- Hack App
- Easy Hack Tools
- Hack Tools Github
- Easy Hack Tools
- Usb Pentest Tools
- Hacker Tools Apk
- New Hack Tools
- Black Hat Hacker Tools
- Ethical Hacker Tools
- Pentest Tools Nmap
- Hack Rom Tools
- Android Hack Tools Github
- New Hacker Tools
- Growth Hacker Tools
- Hacking Tools Windows
- Hack Tools For Windows
- Hacker Security Tools
- Pentest Tools Alternative
- Hacking Tools Windows
- Physical Pentest Tools
- Hacker Tools
- Pentest Tools Tcp Port Scanner
- Tools For Hacker
- Hacking App
- Hacker Security Tools
- Pentest Tools Alternative
- Hack Apps
- Hack Tools 2019
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Apk
- Hacking Tools And Software
- Pentest Tools Framework
- Hack Tool Apk
- Hack Tools
- Pentest Tools Url Fuzzer
- Pentest Tools For Ubuntu
- What Is Hacking Tools
- What Is Hacking Tools
- Pentest Tools Url Fuzzer
- Easy Hack Tools
- Hacking Tools 2019
- Physical Pentest Tools
- Hacker Tools Linux
- Hacking App
- Hacking Tools For Kali Linux
- Hacking Tools
- Hacking Tools Name
- Hack Tools Github
- Hacking Tools Download
- Hacking Tools For Windows 7
- Hack Tools Online
- Computer Hacker
- Hack Tools Mac
- New Hacker Tools
- Pentest Tools Find Subdomains
- New Hacker Tools
- Pentest Tools For Mac
- Pentest Tools Open Source
- Hackrf Tools
- Hacking Tools 2020
- Hacker Tools For Pc
- Hacker Tools Free
- Pentest Tools Tcp Port Scanner
- Hacker Tools Hardware
- Hacking Tools For Mac
- Pentest Tools Website Vulnerability
- What Is Hacking Tools
No hay comentarios:
Publicar un comentario