Intro
Most of the web applications I see are kinda binary when it comes to CSRF protection; either they have one implemented using CSRF tokens (and more-or-less covering the different functions of the web application) or there is no protection at all. Usually, it is the latter case. However, from time to time I see application checking the Referer HTTP header.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
The OWASP Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet tells us that this defense approach is a baaad omen, but finding a universal and simple solution on the Internetz to strip the Referer header took somewhat more time than I expected, so I decided that the stuff that I found might be useful for others too.
Solutions for Referer header strip
Most of the techniques I have found were way too complicated for my taste. For example, when I start reading a blog post from Egor Homakov to find a solution to a problem, I know that I am going to:
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
- learn something very cool;
- have a serious headache from all the new info at the end.
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
<html>
<meta name="referrer" content="never">
<body>
<form action="https://vistimsite.com/function" method="POST">
<input type="hidden" name="param1" value="1" />
<input type="hidden" name="param2" value="2" />
...
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Conclusion
As you can see, there is quite a lot of ways to strip the Referer HTTP header from the request, so it really should not be considered a good defense against CSRF. My preferred way to make is PoC is with the meta tag, but hey, if you got any better solution for this, use the comment field down there and let me know! :)
Related articles
- Pentest Tools Review
- Hacking Tools Windows 10
- Hack Rom Tools
- Growth Hacker Tools
- Hacking Tools Usb
- Hacking Tools
- Pentest Tools Subdomain
- Pentest Tools For Ubuntu
- Pentest Tools For Android
- Hacking Tools For Beginners
- Hacker Tools Online
- Hack Tools For Pc
- Hacking Tools Kit
- Pentest Tools Linux
- Pentest Tools Tcp Port Scanner
- Hack Tools Mac
- Hak5 Tools
- Pentest Tools Free
- Nsa Hacker Tools
- Hacking Tools 2019
- Hacking Tools Hardware
- Hacking Tools Software
- New Hacker Tools
- Pentest Reporting Tools
- Pentest Tools Subdomain
- Hacker Tools Mac
- Usb Pentest Tools
- How To Hack
- Computer Hacker
- Hack Tools For Games
- Pentest Tools For Ubuntu
- Hacking Tools
- Game Hacking
- Hack Tools For Windows
- Best Hacking Tools 2020
- What Are Hacking Tools
- Android Hack Tools Github
- Hackers Toolbox
- Hacking Tools Name
- Hack App
- Pentest Tools For Android
- Pentest Tools Tcp Port Scanner
- Hack Tool Apk No Root
- New Hacker Tools
- Black Hat Hacker Tools
- Hack Tools
- Pentest Tools Kali Linux
- Pentest Tools Alternative
- Pentest Box Tools Download
- Hacker Tools Mac
- Pentest Tools For Android
- New Hacker Tools
- Hack Tools Mac
- Usb Pentest Tools
- Hacks And Tools
- Hacker Tools
- Hacking Tools For Beginners
- How To Install Pentest Tools In Ubuntu
- Hack Tools Pc
- Android Hack Tools Github
- Hack Tools Github
- Pentest Tools For Windows
- Pentest Tools Kali Linux
- Pentest Tools For Mac
- Hacker Tools Hardware
- Pentest Box Tools Download
- Hack Tool Apk No Root
- Hacking Tools For Windows
- Pentest Tools Alternative
- Hacker Tool Kit
- Hack Tools For Windows
- Best Pentesting Tools 2018
- Pentest Tools Find Subdomains
- Hacker Tools For Windows
- What Is Hacking Tools
- Hacking Tools Mac
- Hacking Tools Online
- How To Make Hacking Tools
- Hacking Tools Pc
- Hacking Tools Windows 10
- Hack Tools Github
- What Are Hacking Tools
- Hacker Tools For Mac
- Hacker Hardware Tools
- Hacking Tools For Beginners
- What Are Hacking Tools
- Hacking App
- Pentest Tools Download
- Hak5 Tools
- Hack Tools Mac
- Pentest Tools Website Vulnerability
- Nsa Hack Tools
- Hack And Tools
- Hack Tools For Mac
- Hacking App
- Free Pentest Tools For Windows
- Hacking Tools Pc
- Hackers Toolbox
- Hacker Tools Software
- Hacker Tools Free
- Hackrf Tools
- Hacker Tools Free
- Hack Tools Mac
- Hacking Tools Pc
- Hack Rom Tools
- Hacker Tools Software
- Hacking Tools Software
- Kik Hack Tools
- Hacker
- Pentest Tools Apk
- Hacking Tools Hardware
- Pentest Tools Subdomain
- Pentest Tools Website
- Pentest Tools Website Vulnerability
- Hacking Tools Pc
- Computer Hacker
- Hack Tools Mac
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.