Loading ...
Try HTTPCS +33 1 85 09 15 09

Cross-Site Request Forgery (CSRF) vulnerability

What is a CSRF vulnerability and how to prevent it?

This kind of attack simply consists of having a victim execute an HTTP request unwittingly. The goal is to make our victim consult a page to execute the actions of the page, with its privileges (usually higher than ours).

14 days Free trial

No Commitment

OWASP ranking

What is a Cross-Site Request Forgery vulnerability ?

In the real life, a CSRF attack would be someone malicious who adds an item to your shopping cart when you do your supermarket shopping. The cashier would scans the product without knowing that it does not belong to you. If the attack was not detected, you would pay for the item in question.

Security flaws

For example :

Imagine we are consulting a blog and we want to delete an article. The problem is that we are not the administrator of this blog, it means that we do not have the necessary rights to remove this article.
Anyway we know the URL used by the administration to make an article deletion : www.mysite.com/article.php?id=154&action=delete

Of course we can’t enter this URL directly because the system checks the rights before performing any actions. The idea is to find a way to get to this URL as an administrator. We have two possibilities : use an XSS vulnerability to steal the cookies of the administrator and log in or use a CSRF to redirect the administrator to this page, and thus have the article deleted without the administrator being aware of it.

To have this HTTP request executed by the blog administrator, you can, for example, send a link to a fraudulent site that will contain hidden code. We can imagine that on this page there is an image and that its source is the deletion link of this article :
<img src = “www.monsite.com/article.php?id=154&action=delete” height = “0” width = “0”>

When the page is opened, the code is executed.


Secure your sites

How to protect yourself against Cross-Site Request Forgery vulnerabilities ?

To protect you this kind of attack you must use tokens to be sent in addition to the other parameters. These single use tokens are used to check actions and make it impossible to predict a URL. For example in the above case it would have been necessary to add a parameter to the URL: www.mysite.com/article.php?id=154&action=delete&token=34zm17o1aphj64

Web Vulnerability Scanner of HTTPCS

How to detect TOP 10 OWASP vulnerabilities?

Detect security flaws on your website or web application thanks to the Web Vulnerability Scanner of HTTPCS. This online security tool allows you to detect any flaws you have (top 10 OWASP, CVE and other vulnerabilities implemented in the robot) to ensure the best protection of your site on a daily basis. Easily schedule automated audits, discover your vulnerabilities and find out what patches to apply to avoid being hacked.

Test for free the CSRF Scanner

14 days Free trial

No Commitment