Cross site request forgery (CSRF) risksRequest Pricing

Cross site request forgery (CSRF) risks

Cross-site request forgery, also known as a

one-click attack

or

session riding

and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts. Unlike cross-site scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser.

Specialized Pen Testing

1

Header manipulation

2

Business Logic Flaws

3

Flash Based GUI apps

Header manipulation

Web pages work on the simply fundamental of HTTP headers, whereby the invalidated data is sent in an HTTP response header and can enable cache-poisoning, cross-site scripting, cross-user defacement, page hijacking, cookie manipulation or open redirect. Read More

Business Logic Flaws

Most of the web applications are moving to cloud technology. While this enhances the appliaction functionality, it also introduces security issues. Since everything is virtual in case of a cloud hosting, it is difficult to gain fine grain control of the "data at rest" and "data in transit" Read More

Flash Based GUI apps

Many web applications use Flash content to enhance their users' experience with rich graphics and screen control. Unfortunately the embeded web services which are used by Flash, are vulnerable to attacks. Since Flash is a "thick client" application interface, it becomes even harder to decipher such attacks and stop those. Read More

Prevention :


Individual Web users using unmodified versions of the most popular browsers can do relatively little to prevent cross-site request forgery. Logging out of sites and avoiding their "remember me" features can mitigate CSRF risk; not displaying external images or not clicking links in spam or untrusted e-mails may also help.

Browser extensions such as RequestPolicy (for Mozilla Firefox) can prevent CSRF by providing a default-deny policy for cross-site requests. However, this can significantly interfere with the normal operation of many websites. The CsFire extension (also for Firefox) can mitigate the impact of CSRF with less impact on normal browsing, by removing authentication information from cross-site requests. The NoScript extension for Firefox mitigates CSRF threats by distinguishing trusted from untrusted sites, and removing payloads from POST requests sent by untrusted sites to trusted ones. The Self Destructing Cookies extension for Firefox does not directly protect from CSRF, but can mitigate the threat by deleting cookies as soon as they are no longer associated with an open tab.

Web sites have various CSRF countermeasures available:

An easy and effective solution is to use a CSRF filter such as OWASP's CSRFGuard. The filter intercepts responses, detects if it is a html document and inserts a token into the forms and optionally inserts script to insert tokens in ajax functions. The filter also intercepts requests to check that the token is present.

We at Valency Networks, India, can catch these serious security problems in our vulnerability assessment and provide solutions.