Intro
Most of the web applications I see are kinda binary when it comes to CSRF protection; either they have one implemented using CSRF tokens (and more-or-less covering the different functions of the web application) or there is no protection at all. Usually, it is the latter case. However, from time to time I see application checking the Referer HTTP header.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
The OWASP Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet tells us that this defense approach is a baaad omen, but finding a universal and simple solution on the Internetz to strip the Referer header took somewhat more time than I expected, so I decided that the stuff that I found might be useful for others too.
Solutions for Referer header strip
Most of the techniques I have found were way too complicated for my taste. For example, when I start reading a blog post from Egor Homakov to find a solution to a problem, I know that I am going to:
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
- learn something very cool;
- have a serious headache from all the new info at the end.
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
<html>
<meta name="referrer" content="never">
<body>
<form action="https://vistimsite.com/function" method="POST">
<input type="hidden" name="param1" value="1" />
<input type="hidden" name="param2" value="2" />
...
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Conclusion
As you can see, there is quite a lot of ways to strip the Referer HTTP header from the request, so it really should not be considered a good defense against CSRF. My preferred way to make is PoC is with the meta tag, but hey, if you got any better solution for this, use the comment field down there and let me know! :)
Related word- Pentest Automation Tools
- Hacker Tool Kit
- Hack Apps
- Underground Hacker Sites
- Hack Tools Mac
- Usb Pentest Tools
- Pentest Tools Linux
- Pentest Tools For Ubuntu
- Hacking App
- Hack Tool Apk
- Hack Tools Mac
- Underground Hacker Sites
- Easy Hack Tools
- Hack Tools For Pc
- Github Hacking Tools
- Pentest Tools Framework
- Pentest Box Tools Download
- Hacking Tools Kit
- Hacking Tools For Pc
- Hacker Tools For Windows
- Hack Rom Tools
- Pentest Tools Subdomain
- Hacking Apps
- Easy Hack Tools
- Physical Pentest Tools
- Hack Tools For Windows
- Black Hat Hacker Tools
- Pentest Tools Review
- Hack Tools Online
- Black Hat Hacker Tools
- Hacking Tools Mac
- Hacking Tools For Kali Linux
- Pentest Tools Kali Linux
- Hacker Tools For Ios
- Blackhat Hacker Tools
- Hack Tools Online
- Hacking Tools For Windows 7
- Pentest Tools Open Source
- Beginner Hacker Tools
- Best Pentesting Tools 2018
- Pentest Tools List
- Hacking Tools 2019
- Hack Tools For Windows
- Growth Hacker Tools
- Hacking Tools 2019
- Hacking Tools Software
- Hacker Tools For Ios
- Hacker
- Pentest Tools Alternative
- Kik Hack Tools
- Hacking Tools Windows
- Hack Apps
- Hacker Tools 2019
- Hacking Tools Windows
- Hacking Tools
- Hack Tools For Mac
- Nsa Hacker Tools
- Hacker Tools Windows
- Hacker Tools Free Download
- Pentest Tools Subdomain
- Kik Hack Tools
- Tools Used For Hacking
- Black Hat Hacker Tools
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Online
- Pentest Recon Tools
- Hack Tools Pc
- Hacker Tools 2020
- Hacking Tools For Beginners
- Hack Tool Apk
- Pentest Tools Framework
- Pentest Tools Linux
- Hack Tools Online
- Hacking Tools For Mac
- Hacker Security Tools
- Hack Tools Online
- Usb Pentest Tools
- World No 1 Hacker Software
- Hack Rom Tools
- Hacking Tools Pc
- Hack Tools Github
- Hacking Tools For Mac
- Hacking Tools And Software
- Pentest Tools For Mac
- How To Hack
- Pentest Box Tools Download
- Tools Used For Hacking
- Pentest Tools Apk
- Hack Tools
- Hacking Tools And Software
- Hacker Tools For Mac
- Hack Tools Pc
- Hacking Tools Download
- Tools Used For Hacking
- Hacker Tools Free
- Hacker Tools Apk Download
- Pentest Tools Download
- Hacking Tools Windows 10
- Best Pentesting Tools 2018
- How To Hack
- Top Pentest Tools
- Hack Tools For Windows
- What Are Hacking Tools
- Termux Hacking Tools 2019
- Hacker Tools List
- Install Pentest Tools Ubuntu
- Hacker Tools List
- Tools 4 Hack
- Hacking Tools For Windows Free Download
- How To Hack
- Hack Tools Pc
- Hack Website Online Tool
- Hack Tools For Pc
- Pentest Automation Tools
- Hacking Tools For Mac
- Pentest Tools Website Vulnerability
- Hack Tools For Ubuntu
- Black Hat Hacker Tools
- Hacker Tools Apk
- Game Hacking
- Hackers Toolbox
- Hacking Tools For Beginners
- Hack Tools For Pc
- Nsa Hack Tools Download
- Pentest Tools For Android
- Tools 4 Hack
- New Hacker Tools
- Hack Tools
- Hacking Tools
- Hacker Tools For Mac
- Pentest Tools For Ubuntu
- Hacker Tools For Ios
- Pentest Box Tools Download
- Hacking Tools Github
- Physical Pentest Tools
- Hacker Tools 2020
- Nsa Hacker Tools
- Hacking Tools Online
- Pentest Tools Website
- Pentest Tools Download
- Pentest Tools Website
- Tools 4 Hack
- Best Hacking Tools 2019
- Hacker Tools Linux
- Pentest Recon Tools
- New Hack Tools
- Hacker Tools For Pc
- Pentest Automation Tools
- Hacker Tools For Windows
- Hacking Tools Download
- Hack Tools Mac
- Nsa Hack Tools
- Hacker Security Tools
- Hacker Tools Mac
- Hack Tools Download
- Best Hacking Tools 2020
- Hack Tools Online
- New Hacker Tools
- Hacker Tools For Ios
- Tools 4 Hack
- Top Pentest Tools
- Hacking Tools For Windows Free Download
- Pentest Tools Find Subdomains
- Hacking Tools And Software
- Bluetooth Hacking Tools Kali
- Computer Hacker
- Hacking Tools Online
- Hacker Tools Free Download
- Pentest Tools Android
- New Hack Tools
- Hackrf Tools
- Hacking Tools Mac
- Hack Tools Github
No hay comentarios:
Publicar un comentario