Intro
Most of the web applications I see are kinda binary when it comes to CSRF protection; either they have one implemented using CSRF tokens (and more-or-less covering the different functions of the web application) or there is no protection at all. Usually, it is the latter case. However, from time to time I see application checking the Referer HTTP header.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
The OWASP Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet tells us that this defense approach is a baaad omen, but finding a universal and simple solution on the Internetz to strip the Referer header took somewhat more time than I expected, so I decided that the stuff that I found might be useful for others too.
Solutions for Referer header strip
Most of the techniques I have found were way too complicated for my taste. For example, when I start reading a blog post from Egor Homakov to find a solution to a problem, I know that I am going to:
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
- learn something very cool;
- have a serious headache from all the new info at the end.
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
<html>
<meta name="referrer" content="never">
<body>
<form action="https://vistimsite.com/function" method="POST">
<input type="hidden" name="param1" value="1" />
<input type="hidden" name="param2" value="2" />
...
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Conclusion
As you can see, there is quite a lot of ways to strip the Referer HTTP header from the request, so it really should not be considered a good defense against CSRF. My preferred way to make is PoC is with the meta tag, but hey, if you got any better solution for this, use the comment field down there and let me know! :)
Related links
- Nsa Hack Tools
- Hackrf Tools
- Hacker Tools Online
- Hacking Tools Kit
- Pentest Tools Windows
- Pentest Tools For Mac
- Pentest Tools Tcp Port Scanner
- Hacking Tools Online
- Hacking Apps
- Pentest Tools Website Vulnerability
- Hack Tools 2019
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Software
- Hack Website Online Tool
- Pentest Recon Tools
- Hack And Tools
- Hacking Tools Software
- Hacking Tools Usb
- Pentest Reporting Tools
- Hacking Tools Pc
- Pentest Tools Subdomain
- Pentest Tools Url Fuzzer
- Hacking Tools For Games
- Hacker Tool Kit
- Pentest Tools Android
- Top Pentest Tools
- Hacking Tools For Windows Free Download
- Hacker
- Hack Tools For Games
- Nsa Hack Tools
- Hacker Tools Free
- Hack Tools Download
- Hacker Tools Free
- Hacker
- How To Hack
- Pentest Tools Framework
- Hacker Tool Kit
- Pentest Tools Online
- Hackers Toolbox
- Hacking Tools For Mac
- Hacker Tools Free Download
- Kik Hack Tools
- Pentest Tools For Windows
- Usb Pentest Tools
- Hacker Tool Kit
- Hacker Tools Github
- Hackrf Tools
- Beginner Hacker Tools
- Hacker Security Tools
- Hacking Tools For Mac
- Hacking Tools Hardware
- Pentest Tools Alternative
- What Is Hacking Tools
- Hack Tools
- Hacking Tools Usb
- Pentest Tools Port Scanner
- Hak5 Tools
- Pentest Tools For Ubuntu
- Pentest Tools Url Fuzzer
- Pentest Tools For Windows
- Pentest Tools For Windows
- Pentest Tools Bluekeep
- Hacker Tools For Mac
- Pentest Tools Download
- Hacker Tools For Ios
- Pentest Tools Bluekeep
- Pentest Tools Github
- Hacker Tools Apk
- Hacking Tools Pc
- Hacker Tool Kit
- Hacker Tools Hardware
- Pentest Tools Kali Linux
- Pentest Tools Website Vulnerability
- Hacking Tools Github
- Pentest Tools Free
- Pentest Box Tools Download
- Hak5 Tools
- How To Install Pentest Tools In Ubuntu
- New Hack Tools
- Hacker Tools Free Download
- Pentest Tools Free
- Hacking Tools Pc
- Hacker Tools 2020
- Hacking Tools Pc
- Hacking Tools Usb
- Computer Hacker
- Hacker Tools Linux
- Nsa Hack Tools
- Beginner Hacker Tools
- Hacking Tools Windows
- Hacker
- Hacking Tools For Games
- Bluetooth Hacking Tools Kali
- Hack Tools 2019
- Hacker Tools Windows
- Hack Tools For Pc
- Hacking Tools Kit
- Pentest Tools Apk
- Pentest Tools Kali Linux
- Underground Hacker Sites
- Nsa Hack Tools Download
- Hack Tools For Ubuntu
- Pentest Reporting Tools
- Hacker Tools For Mac
- Hacker Tools Hardware
- Hack Rom Tools
- Pentest Recon Tools
- Pentest Tools For Ubuntu
- Hacking Tools Github
- Hacking Tools Windows 10
- Pentest Tools Nmap
- Hack Tool Apk No Root
- Hacker Tools Mac
- Hacker Techniques Tools And Incident Handling
- Hack Tools For Windows
- Hak5 Tools
- Kik Hack Tools
- Hack Tools Online
- Hak5 Tools
- Hack Tools For Windows
- Hacker Tools 2020
- Hacker Tools Mac
- Hak5 Tools
- Hacks And Tools
- Pentest Tools Nmap
- Hacking Tools For Pc
- Hacking Tools For Windows Free Download
- Pentest Tools
- Hack And Tools
- Hackrf Tools
- Hack Tools For Games
- Android Hack Tools Github
- Easy Hack Tools
- Hacks And Tools
- Pentest Tools Online
- Hacking Tools Kit
- Pentest Tools Github
- Hak5 Tools
- Hacking Tools Mac
- Hacking Tools 2019
- Hacking Tools For Games
No comments:
Post a Comment