The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet757/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   753   754   755   756   757   758   759   760   ...   875
Bog'liq
3794 1008 4334

Cross-Site Request Forgery

Cross-site request forgery (XSRF) involves a similar delivery mechanism to the

frame injection attack described earlier. However, XSRF does not involve the

attacker presenting any spoofed content to the user. Rather, the attacker creates

an innocuous-looking web site that causes the user’s browser to submit a

request directly to the vulnerable application, to perform some unintended

action that is beneficial to the attacker.

70779c12.qxd:WileyRed  9/14/07  3:14 PM  Page 442




Recall that the browser’s same origin policy does not prohibit one web site

from issuing requests to a different domain. It does, however, prevent the orig-

inating web site from processing the responses to cross-domain requests.

Hence, unlike its on-site counterpart, XSRF attacks are “one-way” only. It

would not be possible to perform the multistage actions of the Samy worm in

a pure XSRF attack.

One well-known example of an XSRF flaw was found in the eBay applica-

tion by Dave Armstrong in 2004. It was possible to craft a URL that caused the

requesting user to make an arbitrary bid on an auction item. A third-party web

site could cause visitors to request this URL, so that any eBay user who visited

the web site would place a bid. Further, with a little work, it was possible to

exploit the vulnerability in a stored OSRF attack within the eBay application

itself. The application allowed users to place 

tags within auction

descriptions. To defend against attacks, the application validated that the tar-

get of the tag returned an actual image file. However, it was possible to place

a link to an off-site server that returned a legitimate image at the time the auc-

tion item was created, and subsequently replace this image with an HTTP redi-

rect back to the crafted XSRF URL. Thus, anyone who viewed the auction item

would unwittingly place a bid on it. More details can be found in the original

Bugtraq post:

http://archive.cert.uni-stuttgart.de/bugtraq/2005/04/msg00279.html




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   753   754   755   756   757   758   759   760   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish