Intro
Most of the web applications I see are kinda binary when it comes to CSRF protection; either they have one implemented using CSRF tokens (and more-or-less covering the different functions of the web application) or there is no protection at all. Usually, it is the latter case. However, from time to time I see application checking the Referer HTTP header.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
The OWASP Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet tells us that this defense approach is a baaad omen, but finding a universal and simple solution on the Internetz to strip the Referer header took somewhat more time than I expected, so I decided that the stuff that I found might be useful for others too.
Solutions for Referer header strip
Most of the techniques I have found were way too complicated for my taste. For example, when I start reading a blog post from Egor Homakov to find a solution to a problem, I know that I am going to:
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
- learn something very cool;
- have a serious headache from all the new info at the end.
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
<html>
<meta name="referrer" content="never">
<body>
<form action="https://vistimsite.com/function" method="POST">
<input type="hidden" name="param1" value="1" />
<input type="hidden" name="param2" value="2" />
...
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Conclusion
As you can see, there is quite a lot of ways to strip the Referer HTTP header from the request, so it really should not be considered a good defense against CSRF. My preferred way to make is PoC is with the meta tag, but hey, if you got any better solution for this, use the comment field down there and let me know! :)
Related articles- Hacker Tools Free
- Hacker Tools For Pc
- Pentest Tools Port Scanner
- Hacking Tools Online
- Wifi Hacker Tools For Windows
- Hacking Tools For Mac
- Hacker Tools Windows
- Hack Tools For Ubuntu
- Hacking App
- Hacking Tools For Pc
- Hacker Search Tools
- Hack Tools Github
- Pentest Tools Nmap
- Pentest Tools List
- Pentest Tools Online
- Pentest Tools Url Fuzzer
- Pentest Tools Nmap
- Hacker Tools List
- Hacker Tools List
- Hacks And Tools
- Hacking Tools Windows 10
- New Hack Tools
- Android Hack Tools Github
- Usb Pentest Tools
- Pentest Tools Kali Linux
- Hacking App
- Best Hacking Tools 2019
- Bluetooth Hacking Tools Kali
- Github Hacking Tools
- Pentest Tools For Ubuntu
- Pentest Tools Subdomain
- Hacker Tools Github
- Hacking Tools Kit
- Pentest Box Tools Download
- Tools For Hacker
- Hack Tools For Pc
- Blackhat Hacker Tools
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Framework
- Pentest Tools Windows
- Hacker Tools Free Download
- Hacking Tools Download
- Android Hack Tools Github
- Pentest Tools For Windows
- Github Hacking Tools
- Hack Tool Apk
- Best Hacking Tools 2020
- Hack Rom Tools
- Pentest Tools Free
- Hacking Tools Mac
- Hacking Tools Online
- How To Install Pentest Tools In Ubuntu
- Pentest Tools For Android
- Pentest Tools Android
- Pentest Tools
- Pentest Tools For Android
- Bluetooth Hacking Tools Kali
- Hack Tool Apk
- Pentest Tools Download
- Hacking Tools Mac
- Hacking Tools 2020
- Pentest Tools For Android
- Pentest Tools Windows
- How To Hack
- Tools 4 Hack
- Pentest Box Tools Download
- Usb Pentest Tools
- Pentest Tools Bluekeep
- What Are Hacking Tools
- Pentest Tools List
- Hacking Tools Software
- Hacking Tools Github
- Hacking Tools
- Hacking Tools Download
- Ethical Hacker Tools
- Wifi Hacker Tools For Windows
- Hack Tool Apk
- Hack Tools For Ubuntu
- Hacker
- Pentest Tools Android
- Hacking Tools For Pc
- Nsa Hack Tools
- Hacker Tools For Pc
- Hacker Tools For Pc
- Pentest Tools Website
- Pentest Tools Download
- Hack Tools For Windows
- Hacker Tools Windows
- Hacker Tools
- Pentest Tools Android
- Hacking Tools For Pc
- Hacker Tools Software
- Physical Pentest Tools
- Hacker Tools
- Hacker Tool Kit
- Install Pentest Tools Ubuntu
- Github Hacking Tools
- Pentest Tools Github
- Hacker Tools For Windows
- Physical Pentest Tools
- Hack Tools Mac
- Black Hat Hacker Tools
- Hacker Search Tools
- Hack Apps
- Hacking Tools Pc
- Hacking Tools Github
- Beginner Hacker Tools
- Hack Rom Tools
- Pentest Tools Url Fuzzer
- Pentest Tools Subdomain
- Hack Apps
- Top Pentest Tools
- Pentest Tools
- How To Hack
- Hack Tools Online
- Nsa Hack Tools
- Ethical Hacker Tools
- Pentest Tools Open Source
- Hacker
- Hack Apps
- Pentest Tools Free
- Pentest Tools Website
- Hackers Toolbox
- Free Pentest Tools For Windows
- Hacker Tools 2019
- New Hacker Tools
- Hacking Tools Free Download
- Hacking Tools For Windows Free Download
- Hackers Toolbox
- Hacking Tools Windows 10
- Hacker Tools 2020
- Hacker Tools
- Hacking Tools For Kali Linux
- Pentest Tools Alternative
- Pentest Tools Free
- Underground Hacker Sites
- Hacker Search Tools
- Pentest Tools Review
- Kik Hack Tools
- Beginner Hacker Tools
- Hacker Tools Linux
- Hacker Tools List
- Bluetooth Hacking Tools Kali
- Computer Hacker
- Hacker Tool Kit
- Github Hacking Tools
- Hacking Tools And Software
- Pentest Reporting Tools
- Pentest Tools Website
- Hacker Search Tools
- Hacking Tools Windows
- Hacker Tools Github
- Pentest Tools Website
- Pentest Tools Url Fuzzer
- Hacking Tools Kit
- Hack Tools For Pc
- Tools For Hacker
- Hacking Tools
- Black Hat Hacker Tools
- Beginner Hacker Tools
- Hacking Tools 2019
- Hacker Techniques Tools And Incident Handling
- Pentest Tools For Mac
- Hack Tools Online
- Hacking Tools For Pc
- Hacker Tools For Windows
- Hacker Search Tools
- Pentest Tools For Windows
- Hack App
- Hacking Tools For Pc
- Hacking Tools 2020
- Hack Tools 2019
- Pentest Tools Android
- World No 1 Hacker Software
- Hacker Tools Mac
No comments:
Post a Comment