- Bug Bounty Hunting Essentials
- Carlos A. Lozano Shahmeer Amir
- 196字
- 2021-06-10 18:35:36
Why does the CSRF exist?
Let's go back to the Facebook example. Josefina is a Facebook user, and she accessed Facebook using her username and password. Facebook created a session ID, and stored it in a cookie, which is managed by Josefina's browser. A week later, Josefina accessed Facebook again, but this time, Josefina did not enter her username and password. The browser sends the session that it has in the cookie to Facebook, and Josefina could access her account.
Josefina used a game in Facebook that had an external link. This means that the business logic Josefina is interacting with does not reside in Facebook's servers. After finishing the game, Josefine came back to her account and noticed posts on her wall about Viagra. All of them were posted by her, but she did not do it. What happened?
The game played by Josefina used the information stored in the cookie to post spam on her wall. In Facebook's eyes, this is a completely valid action.
In simple terms, this is a CSRF attack, without big consequences, but just imagine the impact if an online bank, a casino, or a trading application, allowed a CSRF.
- 安全技術運營:方法與實踐
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- 云原生安全技術實踐指南
- End to End GUI Development with Qt5
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 計算機網絡安全實驗指導
- 數字銀行安全體系構建
- 5G網絡安全規劃與實踐
- Instant OSSEC Host-based Intrusion Detection System
- 黑客攻防從入門到精通:實戰篇(第2版)
- Developing Applications with Salesforce Chatter
- 互聯網域名國際化與安全技術導論
- 大數據時代的云安全
- 深入探索區塊鏈
- Hack-A-Sat太空信息安全挑戰賽深度題解