Intro
Most of the web applications I see are kinda binary when it comes to CSRF protection; either they have one implemented using CSRF tokens (and more-or-less covering the different functions of the web application) or there is no protection at all. Usually, it is the latter case. However, from time to time I see application checking the Referer HTTP header.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
The OWASP Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet tells us that this defense approach is a baaad omen, but finding a universal and simple solution on the Internetz to strip the Referer header took somewhat more time than I expected, so I decided that the stuff that I found might be useful for others too.
Solutions for Referer header strip
Most of the techniques I have found were way too complicated for my taste. For example, when I start reading a blog post from Egor Homakov to find a solution to a problem, I know that I am going to:
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
- learn something very cool;
- have a serious headache from all the new info at the end.
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
<html>
<meta name="referrer" content="never">
<body>
<form action="https://vistimsite.com/function" method="POST">
<input type="hidden" name="param1" value="1" />
<input type="hidden" name="param2" value="2" />
...
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Conclusion
As you can see, there is quite a lot of ways to strip the Referer HTTP header from the request, so it really should not be considered a good defense against CSRF. My preferred way to make is PoC is with the meta tag, but hey, if you got any better solution for this, use the comment field down there and let me know! :)
More information
- Hack Tools 2019
- Nsa Hack Tools Download
- Hacking Tools Windows
- Pentest Tools For Mac
- New Hacker Tools
- Pentest Tools Review
- Hacking Tools For Windows Free Download
- Game Hacking
- Hack Apps
- How To Hack
- World No 1 Hacker Software
- Easy Hack Tools
- Hack Tools 2019
- Hacker Tools For Mac
- Hacking Tools Windows 10
- Hacker Search Tools
- Pentest Tools Url Fuzzer
- Hacker Tools Github
- Hacker Tools
- Hacking Tools Name
- Hack Tools
- Github Hacking Tools
- Hacking Tools Windows 10
- Usb Pentest Tools
- Pentest Tools Alternative
- Hacking Tools Mac
- Top Pentest Tools
- Hack Tools Github
- Hacking Tools
- Pentest Tools Download
- Hacking Tools For Beginners
- Hacking Tools Windows 10
- Pentest Tools Website
- Hack Tools
- Hacker Tools Software
- Pentest Tools Website Vulnerability
- New Hack Tools
- New Hack Tools
- Top Pentest Tools
- Pentest Tools Website Vulnerability
- Hacking Tools Windows
- Nsa Hacker Tools
- Hacking App
- Hackers Toolbox
- Termux Hacking Tools 2019
- Pentest Tools Alternative
- Top Pentest Tools
- Hacking Tools Windows
- Hacking Tools Pc
- Pentest Tools For Mac
- Underground Hacker Sites
- Easy Hack Tools
- Kik Hack Tools
- Hack Tools Online
- Hacking Tools Free Download
- Hacker Tools Hardware
- Hacking Tools For Mac
- Hacker Tools Linux
- Pentest Tools Android
- Termux Hacking Tools 2019
- Pentest Tools Open Source
- Pentest Tools List
- Hacker
- Black Hat Hacker Tools
- Best Hacking Tools 2019
- Hacking Tools For Beginners
- Hacking Tools Kit
- What Are Hacking Tools
- Black Hat Hacker Tools
- Hacking Tools For Pc
- Hacker Tools Windows
- Hacking Tools Windows
- Hack Rom Tools
- Tools 4 Hack
- Hackrf Tools
- Hacking Tools Pc
- Top Pentest Tools
- Hacker Tools For Ios
- Hacker Tools Hardware
- Beginner Hacker Tools
- Pentest Tools Website
- Hack Tool Apk No Root
- Hacking Tools Name
- Beginner Hacker Tools
- How To Hack
- Termux Hacking Tools 2019
- Pentest Tools Windows
- Termux Hacking Tools 2019
- Pentest Tools Alternative
- Hacking Tools Windows 10
- Pentest Tools List
- Hacker Tools List
- Hacking Apps
- Pentest Tools For Mac
- Hack Tool Apk No Root
- Hacking Tools For Mac
- Pentest Tools Github
- Hak5 Tools
- Hacker
- Hack Tool Apk No Root
- Install Pentest Tools Ubuntu
- Hacking Tools Online
- Pentest Tools Android
- Best Hacking Tools 2019
- Hacker Tools For Ios
- How To Hack
- Hacker Search Tools
- Tools Used For Hacking
- Tools For Hacker
- Hacker Tools Mac
- Hacker Tools Free Download
- Nsa Hack Tools
- Pentest Tools Website Vulnerability
- Hacker Tools Apk
- Hacking Tools For Beginners
- Easy Hack Tools
- Hack And Tools
- What Is Hacking Tools
- Hacking Tools Download
- Pentest Automation Tools
- Hacker Search Tools
- Hacking Tools For Beginners
- Hacking Tools And Software
- Pentest Tools Alternative
- Black Hat Hacker Tools
- Hack Apps
- Growth Hacker Tools
- Hack Tool Apk No Root
- Hacker Hardware Tools
- Hacking Tools Mac
- Pentest Tools Github
- Wifi Hacker Tools For Windows
- Hack Tools Mac
- Hackers Toolbox
- Pentest Tools Github
- Pentest Tools For Mac
- Growth Hacker Tools
- Nsa Hack Tools
- Hacking Tools Github
- Pentest Tools Apk
- Hacking Tools 2019
- Pentest Tools Port Scanner
No comments:
Post a Comment