CSRF
CWE-352: Cross-Site Request Forgery (CSRF)
Last updated
Was this helpful?
CWE-352: Cross-Site Request Forgery (CSRF)
Last updated
Was this helpful?
Cross-Site Request Forgery (CSRF/XSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated.
CSRF attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request. - OWASP
CSRF Tokens
SameSite Cookie
Json Content-Type
Requiring Re-authentication for Sensitive Actions
Double Submit Cookie Pattern
Origin and Referer Header Validation
Captchas
Custom Request Headers
Authentication-Required Actions: Look for actions that require authentication, such as changing account settings, updating passwords, or making transactions. These are common areas where CSRF vulnerabilities can have significant impact.
User Profile Changes: Check for actions related to user profile changes, such as updating email addresses, changing personal information, or modifying profile pictures.
Account Deletion or Suspension: Actions that allow a user to delete or suspend their account could be targets for CSRF attacks.
Payment and Transactional Actions: Look for payment-related actions like making transactions, adding payment methods, or modifying subscription plans.
Form Submissions: Any action that involves form submissions could potentially be a target. This includes actions like submitting support tickets, submitting feedback, or submitting any kind of content.
CSRF Tokens: Some applications use CSRF tokens as a mitigation technique. Look for instances where CSRF tokens are missing or improperly validated. You might find CSRF tokens in hidden fields within HTML forms or as headers in AJAX requests.
Third-Party Integrations: If the application integrates with third-party services or APIs, check if these integrations are susceptible to CSRF attacks.
Changing Security Settings: Actions related to changing security settings, like enabling two-factor authentication (2FA) or changing security questions, can also be targets.
Privilege Escalation: Actions that involve escalating user privileges, such as changing a user's role or permissions, should be thoroughly tested for CSRF vulnerabilities.
Logging Out: Even the logout functionality can be exploited through CSRF attacks, forcing a victim to unknowingly log out.
Password Reset: If the password reset process doesn't include proper CSRF protections, an attacker could potentially change a user's password without their consent.
test login, logout, reset pass, change password, add-cart, like, comment, profile change, user details change, balance transfer, subscription, etc
to Shopify - 287 upvotes, $500
to Rockstar Games - 227 upvotes, $1000
to Twitter - 204 upvotes, $1540
to InnoGames - 186 upvotes, $1100
to Glassdoor - 152 upvotes, $3000
to Imgur - 141 upvotes, $500
to GitHub - 138 upvotes, $10000
to HackerOne - 134 upvotes, $2500
to Grammarly - 129 upvotes, $750
to Stripe - 105 upvotes, $2500
to Khan Academy - 101 upvotes, $0
to Rockstar Games - 98 upvotes, $1000
to WordPress - 94 upvotes, $950
to Logitech - 85 upvotes, $200
to Flickr - 82 upvotes, $750
to Discourse - 81 upvotes, $512
to Stripe - 80 upvotes, $2500
to Twitter - 79 upvotes, $5040
to TikTok - 78 upvotes, $2373