SlideShare a Scribd company logo
Cross Site Request Forgery Deep Dive In Cincinnati Chapter Meeting May 27 th  ,  2008 [email_address]
Agenda TBD OWASP Publications OWASP Tools Demo By Blaine Wilson OWASP Cincinnati Local Chapter Final Questions
Place of CSRF in the OWASP Top 10 2007  Cross Site Scripting (XSS) Injection Flaws Insecure Remote File Include Insecure Direct Object Reference Cross Site Request Forgery (CSRF) Information Leakage and Improper Error Handling Broken Authentication and Session Management Insecure Cryptographic Storage Insecure Communications Failure to Restrict URL Access http://www.owasp.org/index.php/Top_10
Description of CSRF threat and the impact CSRF forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.  An attacker may force the users of a web application to execute actions of the attackers choosing via social engineering
CSRF Causes The way CSRF is accomplished relies on the following facts: 1) Web browser behavior regarding the handling of session-related information such as cookies and http authentication information; 2) Knowledge of valid web application URLs on the side of the attacker; 3) Application session management relying only on information which is known by the browser; 4) Existence of HTML tags whose presence cause immediate access to an http[s] resource; for example the image tag  img .
Threat Scenario
CSRF is a Same Origin Exploit The GET request could be originated in several different ways:  by the user, who is using the actual web application;  by the user, who types the URL it directly in the browser;  by the user, who follows a link (external to the application) pointing to the URL.
CSRF attack vectors
Example: Webgoat/?
CSRF Countermeasures: Client/User Some mitigating actions are:  Logoff immediately after using a web application  Do not allow your browser to save username/passwords, and do not allow sites to “remember” your login  Do not use the same browser to access sensitive applications and to surf freely the Internet; if you have to do both things at the same machine, do them with separate browsers.  Integrated HTML-enabled mail/browser, newsreader/browser environments pose additional risks since simply viewing a mail message or a news message might lead to the execution of an attack.
CSRF Countermeasures: Developers Add session-related information to the URL Use POST instead of GET Automatic logout mechanisms  Rely on  Referer  headers
Black Box testing and example  Llet  u  the URL being tested; for example, u =  http:// www.example.com /action   build a html page containing the http request referencing url u (specifying all relevant parameters; in case of http GET this is straightforward, while to a POST request you need to resort to some Javascript);  make sure that the valid user is logged on the application;  induce him into following the link pointing to the to-be-tested URL (social engineering involved if you cannot impersonate the user yourself);  observe the result, i.e. check if the web server executed the request.
Gray Box testing and example  Audit the application to ascertain if its session management is vulnerable.  Check If session management relies only on client side values
Tools
Difference Between XSS and CSRF

More Related Content

PPTX
A8 cross site request forgery (csrf) it 6873 presentation
PPTX
Introduction to CSRF Attacks & Defense
PPTX
Understanding Cross-site Request Forgery
PPTX
Cross Site Request Forgery (CSRF) Scripting Explained
PPT
Cross Site Request Forgery
PPTX
CSRF Attack and Its Prevention technique in ASP.NET MVC
PPTX
Sql injections - with example
A8 cross site request forgery (csrf) it 6873 presentation
Introduction to CSRF Attacks & Defense
Understanding Cross-site Request Forgery
Cross Site Request Forgery (CSRF) Scripting Explained
Cross Site Request Forgery
CSRF Attack and Its Prevention technique in ASP.NET MVC
Sql injections - with example

What's hot (20)

PPTX
SSRF exploit the trust relationship
PPT
Introduction to Web Application Penetration Testing
PPTX
SSRF For Bug Bounties
PPT
SQL Injection
PPT
Xss ppt
PPTX
PPTX
Attacking thru HTTP Host header
PPTX
Vulnerabilities in modern web applications
ODP
OWASP Secure Coding
PDF
Secure Session Management
PPTX
PPTX
A2 - broken authentication and session management(OWASP thailand chapter Apri...
PPSX
Sessions and cookies
PDF
Introduction to Cross Site Scripting ( XSS )
PDF
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
PDF
Cross Site Scripting Going Beyond the Alert Box
PDF
KHNOG 3: DDoS Attack Prevention
PDF
Penetration testing web application web application (in) security
PPTX
Deep understanding on Cross-Site Scripting and SQL Injection
PPTX
Brute force-attack presentation
SSRF exploit the trust relationship
Introduction to Web Application Penetration Testing
SSRF For Bug Bounties
SQL Injection
Xss ppt
Attacking thru HTTP Host header
Vulnerabilities in modern web applications
OWASP Secure Coding
Secure Session Management
A2 - broken authentication and session management(OWASP thailand chapter Apri...
Sessions and cookies
Introduction to Cross Site Scripting ( XSS )
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
Cross Site Scripting Going Beyond the Alert Box
KHNOG 3: DDoS Attack Prevention
Penetration testing web application web application (in) security
Deep understanding on Cross-Site Scripting and SQL Injection
Brute force-attack presentation
Ad

Similar to Cross Site Request Forgery Vulnerabilities (20)

PDF
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
PPT
Web Application Security
PDF
A security note for web developers
PPT
Why You Need A Web Application Firewall
DOC
HallTumserFinalPaper
PDF
A4 A K S H A Y B H A R D W A J
PPTX
webapplicationattacks-101005070110-phpapp02.pptx
PPTX
Website hacking and prevention (All Tools,Topics & Technique )
PPT
Cyber security
PDF
CSRF Attacks and its Defence using Middleware
PDF
IRJET- Survey on Web Application Vulnerabilities
PPTX
Cyber security 2.pptx
PDF
React security vulnerabilities
PDF
XSS, LFI & CSRF vulnerabilities
PDF
CSRF: ways to exploit, ways to prevent
PPTX
Cross Site Request Forgery- CSRF
PDF
SeanRobertsThesis
PPT
A privacy-preserving defense mechanism against attacks
PPTX
Security Issues in HTML 5
PPTX
Security Testing Training With Examples
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
Web Application Security
A security note for web developers
Why You Need A Web Application Firewall
HallTumserFinalPaper
A4 A K S H A Y B H A R D W A J
webapplicationattacks-101005070110-phpapp02.pptx
Website hacking and prevention (All Tools,Topics & Technique )
Cyber security
CSRF Attacks and its Defence using Middleware
IRJET- Survey on Web Application Vulnerabilities
Cyber security 2.pptx
React security vulnerabilities
XSS, LFI & CSRF vulnerabilities
CSRF: ways to exploit, ways to prevent
Cross Site Request Forgery- CSRF
SeanRobertsThesis
A privacy-preserving defense mechanism against attacks
Security Issues in HTML 5
Security Testing Training With Examples
Ad

More from Marco Morana (20)

PDF
Is talent shortage ws marco morana
PPTX
Isaca conference threat_modeling_marco_morana_short.pdf
PPTX
Owasp atlanta-ciso-guidevs1
PPTX
Owasp e crime-london-2012-final
PDF
Security And Privacy Cagliari 2012
PPT
Presentation sso design_security
PPTX
Owasp security summit_2012_milanovs_final
PPTX
Security Summit Rome 2011
PPTX
Risk Analysis Of Banking Malware Attacks
PDF
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
PPT
Security Exploit of Business Logic Flaws, Business Logic Attacks
PPT
Software Security Initiatives
PPT
Business cases for software security
PPT
Security Compliance Web Application Risk Management
PPT
Web Application Security Testing
PPT
Owasp Forum Web Services Security
PPT
Owasp Top 10 And Security Flaw Root Causes
PPT
Software Security Frameworks
PPT
OWASP Top 10 And Insecure Software Root Causes
PPT
Software Open Source, Proprierio, Interoperabilita'
Is talent shortage ws marco morana
Isaca conference threat_modeling_marco_morana_short.pdf
Owasp atlanta-ciso-guidevs1
Owasp e crime-london-2012-final
Security And Privacy Cagliari 2012
Presentation sso design_security
Owasp security summit_2012_milanovs_final
Security Summit Rome 2011
Risk Analysis Of Banking Malware Attacks
Web 2.0 threats, vulnerability analysis,secure web 2.0 application developmen...
Security Exploit of Business Logic Flaws, Business Logic Attacks
Software Security Initiatives
Business cases for software security
Security Compliance Web Application Risk Management
Web Application Security Testing
Owasp Forum Web Services Security
Owasp Top 10 And Security Flaw Root Causes
Software Security Frameworks
OWASP Top 10 And Insecure Software Root Causes
Software Open Source, Proprierio, Interoperabilita'

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Cloud computing and distributed systems.
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Spectroscopy.pptx food analysis technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
KodekX | Application Modernization Development
Teaching material agriculture food technology
Understanding_Digital_Forensics_Presentation.pptx
Big Data Technologies - Introduction.pptx
Cloud computing and distributed systems.
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Spectroscopy.pptx food analysis technology
Machine learning based COVID-19 study performance prediction
Per capita expenditure prediction using model stacking based on satellite ima...
Empathic Computing: Creating Shared Understanding
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Digital-Transformation-Roadmap-for-Companies.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Chapter 3 Spatial Domain Image Processing.pdf
MYSQL Presentation for SQL database connectivity
KodekX | Application Modernization Development

Cross Site Request Forgery Vulnerabilities

  • 1. Cross Site Request Forgery Deep Dive In Cincinnati Chapter Meeting May 27 th , 2008 [email_address]
  • 2. Agenda TBD OWASP Publications OWASP Tools Demo By Blaine Wilson OWASP Cincinnati Local Chapter Final Questions
  • 3. Place of CSRF in the OWASP Top 10 2007 Cross Site Scripting (XSS) Injection Flaws Insecure Remote File Include Insecure Direct Object Reference Cross Site Request Forgery (CSRF) Information Leakage and Improper Error Handling Broken Authentication and Session Management Insecure Cryptographic Storage Insecure Communications Failure to Restrict URL Access http://www.owasp.org/index.php/Top_10
  • 4. Description of CSRF threat and the impact CSRF forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. An attacker may force the users of a web application to execute actions of the attackers choosing via social engineering
  • 5. CSRF Causes The way CSRF is accomplished relies on the following facts: 1) Web browser behavior regarding the handling of session-related information such as cookies and http authentication information; 2) Knowledge of valid web application URLs on the side of the attacker; 3) Application session management relying only on information which is known by the browser; 4) Existence of HTML tags whose presence cause immediate access to an http[s] resource; for example the image tag img .
  • 7. CSRF is a Same Origin Exploit The GET request could be originated in several different ways: by the user, who is using the actual web application; by the user, who types the URL it directly in the browser; by the user, who follows a link (external to the application) pointing to the URL.
  • 10. CSRF Countermeasures: Client/User Some mitigating actions are: Logoff immediately after using a web application Do not allow your browser to save username/passwords, and do not allow sites to “remember” your login Do not use the same browser to access sensitive applications and to surf freely the Internet; if you have to do both things at the same machine, do them with separate browsers. Integrated HTML-enabled mail/browser, newsreader/browser environments pose additional risks since simply viewing a mail message or a news message might lead to the execution of an attack.
  • 11. CSRF Countermeasures: Developers Add session-related information to the URL Use POST instead of GET Automatic logout mechanisms Rely on Referer headers
  • 12. Black Box testing and example Llet u the URL being tested; for example, u = http:// www.example.com /action build a html page containing the http request referencing url u (specifying all relevant parameters; in case of http GET this is straightforward, while to a POST request you need to resort to some Javascript); make sure that the valid user is logged on the application; induce him into following the link pointing to the to-be-tested URL (social engineering involved if you cannot impersonate the user yourself); observe the result, i.e. check if the web server executed the request.
  • 13. Gray Box testing and example Audit the application to ascertain if its session management is vulnerable. Check If session management relies only on client side values
  • 14. Tools