Intro
Most of the web applications I see are kinda binary when it comes to CSRF protection; either they have one implemented using CSRF tokens (and more-or-less covering the different functions of the web application) or there is no protection at all. Usually, it is the latter case. However, from time to time I see application checking the Referer HTTP header.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
The OWASP Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet tells us that this defense approach is a baaad omen, but finding a universal and simple solution on the Internetz to strip the Referer header took somewhat more time than I expected, so I decided that the stuff that I found might be useful for others too.
Solutions for Referer header strip
Most of the techniques I have found were way too complicated for my taste. For example, when I start reading a blog post from Egor Homakov to find a solution to a problem, I know that I am going to:
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
- learn something very cool;
- have a serious headache from all the new info at the end.
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
<html>
<meta name="referrer" content="never">
<body>
<form action="https://vistimsite.com/function" method="POST">
<input type="hidden" name="param1" value="1" />
<input type="hidden" name="param2" value="2" />
...
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Conclusion
As you can see, there is quite a lot of ways to strip the Referer HTTP header from the request, so it really should not be considered a good defense against CSRF. My preferred way to make is PoC is with the meta tag, but hey, if you got any better solution for this, use the comment field down there and let me know! :)
More info
- Pentest Tools Framework
- Hacking Tools Usb
- Tools Used For Hacking
- Blackhat Hacker Tools
- Hacks And Tools
- Hacking Tools For Mac
- Pentest Tools Alternative
- Hack Rom Tools
- Pentest Tools Subdomain
- Hacker Tools For Ios
- Nsa Hacker Tools
- Pentest Tools Tcp Port Scanner
- Hacking Tools 2020
- Hack Tools For Pc
- Hack Rom Tools
- New Hacker Tools
- Hacking Tools Usb
- Hacking Tools Github
- Pentest Tools For Mac
- Hacking Tools For Beginners
- Hacking Apps
- New Hack Tools
- Hacking Apps
- Hacking Apps
- Blackhat Hacker Tools
- Hacking Tools For Windows
- Wifi Hacker Tools For Windows
- Hacker Tools Hardware
- Pentest Tools Github
- Install Pentest Tools Ubuntu
- Hacking Tools For Beginners
- Hacking Tools Windows 10
- Hacker Tools Windows
- Hack Tools Pc
- Hacking Tools Kit
- Hack Tool Apk No Root
- New Hack Tools
- Hacking Tools Usb
- Hack Tools For Games
- How To Install Pentest Tools In Ubuntu
- Hacking Tools For Mac
- Hacker Tools For Windows
- Pentest Tools Subdomain
- Hacking Tools 2020
- Hacker Tools For Ios
- Hak5 Tools
- Nsa Hack Tools Download
- Termux Hacking Tools 2019
- Hackers Toolbox
- Pentest Tools Linux
- Pentest Tools Bluekeep
- Hack Tool Apk
- Wifi Hacker Tools For Windows
- Hacking Tools For Beginners
- Hack Tools Download
- Hacking Tools For Windows Free Download
- Pentest Tools Apk
- Underground Hacker Sites
- Hacking Tools For Beginners
- Hack Tools For Mac
- Nsa Hacker Tools
- Hack Tools For Pc
- Hacker Tools Windows
- Hacking Tools For Windows
- Hack Tools Online
- Hack Apps
- Pentest Tools Online
- Hacking Tools Free Download
- How To Make Hacking Tools
- Pentest Tools For Mac
- Ethical Hacker Tools
- Hacker Search Tools
- Github Hacking Tools
- Hack Tool Apk No Root
- Hacker Tools For Windows
- Hack Tool Apk
- Pentest Tools Alternative
- Install Pentest Tools Ubuntu
- Computer Hacker
- Hackers Toolbox
- Pentest Tools Download
- Hack Apps
- Hacking App
- Pentest Tools For Mac
- How To Install Pentest Tools In Ubuntu
- Best Pentesting Tools 2018
- Pentest Tools Alternative
- Hacker Tools Hardware
- Hacker Tools 2020
- Tools For Hacker
- Black Hat Hacker Tools
- Hacking Tools For Windows
- Hacking Tools Hardware
- Tools 4 Hack
- Blackhat Hacker Tools
- Hacker Tools 2019
- Hacker Tools Linux
- Hacking Tools Online
- Hackrf Tools
- Hack Website Online Tool
- Free Pentest Tools For Windows
- Hacker Tools List
- Pentest Tools For Ubuntu
- Hack Tool Apk
- Hacking Tools Online
- Pentest Tools Find Subdomains
- What Is Hacking Tools
- Pentest Tools Kali Linux
- Tools For Hacker
- Growth Hacker Tools
- Pentest Automation Tools
- Hacking Tools And Software
- Hacker Tools Apk
- Pentest Tools Tcp Port Scanner
- Top Pentest Tools
- Pentest Tools List
- Nsa Hack Tools Download
- Wifi Hacker Tools For Windows
- Hacking Tools Name
- Nsa Hack Tools Download
- Hacking App
- Hack Tools Pc
- Hacker Security Tools
- Hacker Tools Apk Download
- Kik Hack Tools
- Free Pentest Tools For Windows
- Hacker
- Black Hat Hacker Tools
- Pentest Tools Github
- Hack Tools For Games
- Hack Tools For Ubuntu
- Hacker Tools Online
- Underground Hacker Sites
- Android Hack Tools Github
- Hack Tool Apk No Root
- Usb Pentest Tools
- Hacking Tools Download
- Hacker Tools Hardware
- Hacking Tools For Pc
- Blackhat Hacker Tools
- Hacking Tools Windows 10
- Pentest Tools For Windows
- Hacker Tools For Ios
- Best Hacking Tools 2019
- Hack Tools
- Pentest Tools For Android
- Hackrf Tools
- Pentest Tools Review
- Hacking Tools Windows 10
- Hack Tool Apk
- Wifi Hacker Tools For Windows
- World No 1 Hacker Software
- How To Make Hacking Tools
- Pentest Tools Windows
- Hackrf Tools
- Hacking Tools And Software
- Blackhat Hacker Tools
- Pentest Tools Bluekeep
- Hack Tool Apk No Root
- Beginner Hacker Tools
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Find Subdomains
- Beginner Hacker Tools
- Hack Tools For Mac
- Hack Tools Mac
No hay comentarios:
Publicar un comentario