CSRF Referer Header Strip
Intro
Most of the web applications I see are kinda binary when it comes to CSRF protection; either they have one implemented using CSRF tokens (and more-or-less covering the different functions of the web application) or there is no protection at all. Usually, it is the latter case. However, from time to time I see application checking the Referer HTTP header.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
The OWASP Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet tells us that this defense approach is a baaad omen, but finding a universal and simple solution on the Internetz to strip the Referer header took somewhat more time than I expected, so I decided that the stuff that I found might be useful for others too.
Solutions for Referer header strip
Most of the techniques I have found were way too complicated for my taste. For example, when I start reading a blog post from Egor Homakov to find a solution to a problem, I know that I am going to:
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
- learn something very cool;
- have a serious headache from all the new info at the end.
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
<html>
<meta name="referrer" content="never">
<body>
<form action="https://vistimsite.com/function" method="POST">
<input type="hidden" name="param1" value="1" />
<input type="hidden" name="param2" value="2" />
...
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Conclusion
As you can see, there is quite a lot of ways to strip the Referer HTTP header from the request, so it really should not be considered a good defense against CSRF. My preferred way to make is PoC is with the meta tag, but hey, if you got any better solution for this, use the comment field down there and let me know! :)
Read more
- Tools 4 Hack
- Hacker Tools Software
- Hacking Tools Usb
- Tools Used For Hacking
- Hacking Tools Online
- Hacker Tools Free
- Hacking Tools For Pc
- Best Pentesting Tools 2018
- Hacking Tools 2019
- Hacking Tools Hardware
- Hacker Tools Hardware
- Hacking Tools Software
- Pentest Tools Open Source
- Hacking Tools Github
- Hacking Tools 2019
- Hack And Tools
- Pentest Tools Apk
- Hacking Tools And Software
- Best Hacking Tools 2020
- Hack Website Online Tool
- Hacking Tools Online
- Hacker Tools Mac
- Hack App
- Pentest Tools For Mac
- Hacking App
- How To Install Pentest Tools In Ubuntu
- Hack Tools Online
- Hacking Tools Download
- Termux Hacking Tools 2019
- Pentest Tools Android
- Hack Tools For Mac
- World No 1 Hacker Software
- Hackers Toolbox
- Growth Hacker Tools
- Hacker Tools Linux
- Pentest Tools Github
- Hacking Tools For Beginners
- Pentest Tools Apk
- Hacker Tools 2020
- Pentest Tools Apk
- Hacking Tools For Kali Linux
- Hacking Tools Kit
- Best Pentesting Tools 2018
- Pentest Tools For Mac
- How To Install Pentest Tools In Ubuntu
- Underground Hacker Sites
- Hacker Security Tools
- Hack Tool Apk No Root
- Hack Tools 2019
- Hacking Tools For Mac
- Hacker Tools For Ios
- Hack Tools
- What Are Hacking Tools
- Hacker Tools Linux
- Hacking Tools Usb
- Hack And Tools
- Hacking Tools Online
- Hacking Tools For Beginners
- Github Hacking Tools
- Pentest Tools
- Hack Tools
- Hack Tools For Games
- Pentest Tools Nmap
- Hacking Tools Windows
- Hack Tools 2019
- Hack Tools For Ubuntu
- Hack Tools For Windows
- Hack And Tools
- Pentest Tools Find Subdomains
- Hacker Tools Github
- Wifi Hacker Tools For Windows
- Blackhat Hacker Tools
- Pentest Tools For Ubuntu
- Best Hacking Tools 2019
- Hackrf Tools
- Hack Tools For Windows
- Hacking App
- Pentest Tools For Windows
- Best Pentesting Tools 2018
- Hackrf Tools
- Hacker Tools List
- Blackhat Hacker Tools
- Hacking Tools 2020
- Pentest Tools Free
- Pentest Tools Online
- Hacking Tools Kit
- Hack Apps
- Hack Tools For Games
- Hacker Tools 2020
- Hacker Tools For Pc
- Hacker Tools Free Download
- Pentest Reporting Tools
- Pentest Tools For Android
- Hacker Tools 2020
- Pentest Tools Review
- Free Pentest Tools For Windows
- Pentest Reporting Tools
- Pentest Automation Tools
- Hacking Apps
- Hacking Tools For Windows Free Download
- New Hacker Tools
- Hack Tools Download
- Physical Pentest Tools
- Hacker Tools Online
- Best Hacking Tools 2020
- Hacker Tools 2019
- Black Hat Hacker Tools
- Hacker Tools For Mac
- Hack Rom Tools
- Top Pentest Tools
- Hacker Hardware Tools
- Pentest Automation Tools
- Hacker Tools For Windows
- Hacking Apps
- Ethical Hacker Tools
- Hack Tools Pc
- Hacking Tools Github
- Hacker Tools Free Download
- Hack Tools For Ubuntu
- Hacker
- Hacker Tools Free
- Hack Tools For Mac
- Pentest Tools Website
- Pentest Box Tools Download
- Hack Tools Download
- World No 1 Hacker Software
- Hack Tools Online
- Hacking Tools Hardware
- Tools 4 Hack
- Hacking Apps
- Pentest Tools Framework
- Hack Tools
- Best Pentesting Tools 2018
- Hacker Tools 2019
- Hacker Tools
- Pentest Tools List
- Hacker Tools
- Hack Tools Github
- Pentest Tools Alternative
- Kik Hack Tools
- Pentest Tools Linux
- Game Hacking
- Hacking Tools Github
- Hacker Tools Free
- Pentest Tools Open Source
- What Are Hacking Tools
0 条评论:
发表评论
订阅 博文评论 [Atom]
<< 主页