Intro
Most of the web applications I see are kinda binary when it comes to CSRF protection; either they have one implemented using CSRF tokens (and more-or-less covering the different functions of the web application) or there is no protection at all. Usually, it is the latter case. However, from time to time I see application checking the Referer HTTP header.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
The OWASP Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet tells us that this defense approach is a baaad omen, but finding a universal and simple solution on the Internetz to strip the Referer header took somewhat more time than I expected, so I decided that the stuff that I found might be useful for others too.
Solutions for Referer header strip
Most of the techniques I have found were way too complicated for my taste. For example, when I start reading a blog post from Egor Homakov to find a solution to a problem, I know that I am going to:
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
- learn something very cool;
- have a serious headache from all the new info at the end.
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
<html>
<meta name="referrer" content="never">
<body>
<form action="https://vistimsite.com/function" method="POST">
<input type="hidden" name="param1" value="1" />
<input type="hidden" name="param2" value="2" />
...
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Conclusion
As you can see, there is quite a lot of ways to strip the Referer HTTP header from the request, so it really should not be considered a good defense against CSRF. My preferred way to make is PoC is with the meta tag, but hey, if you got any better solution for this, use the comment field down there and let me know! :)
More articles
- Pentest Tools Linux
- Hacking Tools
- Github Hacking Tools
- Hacking Tools Windows
- Hacking Tools Software
- Hacking Tools For Pc
- Pentest Tools Tcp Port Scanner
- Hacking Tools 2020
- Hackers Toolbox
- Pentest Tools Subdomain
- Pentest Reporting Tools
- How To Hack
- Hacker Tools Hardware
- Android Hack Tools Github
- Hack Tools
- Pentest Tools Url Fuzzer
- Pentest Tools
- Hacker Tools List
- Pentest Reporting Tools
- Pentest Tools Url Fuzzer
- Hak5 Tools
- Hack Tools For Mac
- Hack Website Online Tool
- Hacking Tools Kit
- Nsa Hack Tools
- Github Hacking Tools
- Easy Hack Tools
- Hacker Tools 2020
- Top Pentest Tools
- Hack Tool Apk
- Hack Tools For Ubuntu
- Free Pentest Tools For Windows
- Hacker Search Tools
- Pentest Tools Android
- Nsa Hacker Tools
- Bluetooth Hacking Tools Kali
- Ethical Hacker Tools
- Hack Tool Apk No Root
- Github Hacking Tools
- Pentest Tools For Ubuntu
- Pentest Tools Find Subdomains
- Tools 4 Hack
- Hacking Tools Download
- Pentest Tools
- Hacker Tools 2020
- Blackhat Hacker Tools
- Hacking Tools For Windows 7
- Hack Tools Mac
- How To Hack
- World No 1 Hacker Software
- Termux Hacking Tools 2019
- Tools 4 Hack
- Pentest Recon Tools
- Hack Rom Tools
- Hacking Tools 2019
- Pentest Box Tools Download
- Pentest Tools Download
- Hack Apps
- Physical Pentest Tools
- Pentest Tools Port Scanner
- Github Hacking Tools
- Hacking Tools Usb
- Hacker Tools Linux
- Hack Tools For Windows
- Pentest Tools Online
- Hacker Tools Apk
- Underground Hacker Sites
- Hack Tools Online
- Hack Tools For Windows
- Pentest Tools List
- Hack Tools 2019
- Pentest Recon Tools
- Hacking Tools For Mac
- How To Make Hacking Tools
- Hacking Tools Pc
- Hacking Tools Hardware
- Hak5 Tools
- Hacking Tools 2020
- Hacking Tools For Beginners
- Pentest Tools
- Hacker Tool Kit
- Hack And Tools
- Tools Used For Hacking
- Hacker Security Tools
- Hack Apps
- Black Hat Hacker Tools
- Hacking Tools Usb
- Hack Rom Tools
- Pentest Tools Port Scanner
- Install Pentest Tools Ubuntu
- What Is Hacking Tools
- Hacking Tools For Games
- Hacker Tools Mac
- Hacker Tools Free Download
- Pentest Tools List
- Hack Tools Download
- Hacker Tools Github
- Hacker Tools For Mac
- Nsa Hack Tools
- Pentest Automation Tools
- Hack Rom Tools
- Hacking Tools Kit
- Hacking Tools For Kali Linux
- Hacking Tools Download
- Top Pentest Tools
- Hacker Tools Windows
- How To Hack
- Hack Website Online Tool
- Hacking Tools For Windows 7
- Hack Rom Tools
- Hacker Techniques Tools And Incident Handling
- Nsa Hacker Tools
- Pentest Tools For Windows
- Usb Pentest Tools
- Best Hacking Tools 2020
- Pentest Reporting Tools
- Hacker Tools Hardware
- Ethical Hacker Tools
- Hacker Tools For Pc
- Hacker
- Hacks And Tools
- Hacker Techniques Tools And Incident Handling
- Hacker Tool Kit
- Android Hack Tools Github
- Termux Hacking Tools 2019
- Hacker Security Tools
- Hack Tools For Pc
- Hack Apps
- Best Pentesting Tools 2018
- Pentest Tools Windows
- Hacking Tools For Games
- Blackhat Hacker Tools
- Hacking Tools Free Download
- Hacker Tools List
- Hacking Tools Github
- World No 1 Hacker Software
- Pentest Tools For Android
- Blackhat Hacker Tools
- Growth Hacker Tools
- Hacker Tools For Windows
- Tools Used For Hacking
- Hack Tools Download
- Hacking Tools For Windows 7
- World No 1 Hacker Software
- Hacking Tools For Pc
- Hacking Tools Usb
- Pentest Tools For Android
- Pentest Tools Port Scanner
- Hack Tool Apk
- Hacking Tools Windows 10
- Hackers Toolbox
- Hacker Tools Apk
- Usb Pentest Tools
- New Hacker Tools
- Pentest Tools List
- Hacking Tools And Software
- Physical Pentest Tools
- Hacker Tools Github
- Hacking Tools Windows
- How To Hack
- Pentest Tools Nmap
No comments:
Post a Comment