Intro
Most of the web applications I see are kinda binary when it comes to CSRF protection; either they have one implemented using CSRF tokens (and more-or-less covering the different functions of the web application) or there is no protection at all. Usually, it is the latter case. However, from time to time I see application checking the Referer HTTP header.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
A couple months ago I had to deal with an application that was checking the Referer as a CSRF prevention mechanism, but when this header was stripped from the request, the CSRF PoC worked. BTW it is common practice to accept empty Referer, mainly to avoid breaking functionality.
The OWASP Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet tells us that this defense approach is a baaad omen, but finding a universal and simple solution on the Internetz to strip the Referer header took somewhat more time than I expected, so I decided that the stuff that I found might be useful for others too.
Solutions for Referer header strip
Most of the techniques I have found were way too complicated for my taste. For example, when I start reading a blog post from Egor Homakov to find a solution to a problem, I know that I am going to:
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
- learn something very cool;
- have a serious headache from all the new info at the end.
Rich Lundeen (aka WebstersProdigy) made an excellent blog post on stripping the Referer header (again, make sure you read that one first before you continue). The HTTPS to HTTP trick is probably the most well-known one, general and easy enough, but it quickly fails the moment you have an application that only runs over HTTPS (this was my case).
The data method is not browser independent but the about:blank trick works well for some simple requests. Unfortunately, in my case the request I had to attack with CSRF was too complex and I wanted to use XMLHttpRequest. He mentions that in theory, there is anonymous flag for CORS, but he could not get it work. I also tried it, but... it did not work for me either.
Krzysztof Kotowicz also wrote a blog post on Referer strip, coming to similar conclusions as Rich Lundeen, mostly using the data method.
Finally, I bumped into Johannes Ullrich's ISC diary on Referer header and that led to me W3C's Referrer Policy. So just to make a dumb little PoC and show that relying on Referer is a not a good idea, you can simply use the "referrer" meta tag (yes, that is two "r"-s there).
The PoC would look something like this:
<html>
<meta name="referrer" content="never">
<body>
<form action="https://vistimsite.com/function" method="POST">
<input type="hidden" name="param1" value="1" />
<input type="hidden" name="param2" value="2" />
...
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Conclusion
As you can see, there is quite a lot of ways to strip the Referer HTTP header from the request, so it really should not be considered a good defense against CSRF. My preferred way to make is PoC is with the meta tag, but hey, if you got any better solution for this, use the comment field down there and let me know! :)
More info
- Hack App
- Nsa Hack Tools Download
- Hack Apps
- Hacker Tools For Windows
- Hacking Apps
- Hacking Tools For Kali Linux
- Hacking Tools Name
- Hacking Tools For Games
- Pentest Box Tools Download
- Pentest Tools
- How To Make Hacking Tools
- Hacking Tools Software
- Hacker Tools Linux
- Hacking Tools 2020
- Hacker Tools Github
- Hack Tools Online
- Hacker Techniques Tools And Incident Handling
- Hacker Tools Hardware
- Hacking Tools For Kali Linux
- Tools For Hacker
- Pentest Tools Nmap
- Hacking Tools And Software
- Best Pentesting Tools 2018
- Game Hacking
- Pentest Automation Tools
- Pentest Tools Nmap
- Hacker Search Tools
- Hacker Tools Linux
- Hacker Tools Mac
- Hacking Tools For Beginners
- Hack Tools Online
- Pentest Tools Review
- Hak5 Tools
- Tools For Hacker
- Hacking Tools Name
- Pentest Tools Download
- Hacking Tools Free Download
- Physical Pentest Tools
- Hacking Tools Free Download
- Pentest Reporting Tools
- Pentest Recon Tools
- Android Hack Tools Github
- How To Hack
- Hacking Tools For Windows Free Download
- Hacker Tools List
- Pentest Tools For Ubuntu
- Hacker Hardware Tools
- How To Hack
- Pentest Tools Alternative
- Underground Hacker Sites
- Top Pentest Tools
- Nsa Hack Tools Download
- Hacking Tools Windows 10
- Hacker Tools 2019
- Blackhat Hacker Tools
- Hacking Tools Name
- Hack Tools
- Pentest Tools Framework
- Pentest Tools Apk
- New Hacker Tools
- Blackhat Hacker Tools
- Pentest Tools Apk
- Hacking Tools 2019
- Hacks And Tools
- Hack Tools Pc
- New Hacker Tools
- Ethical Hacker Tools
- Hacking Tools Pc
- Hack Tools For Windows
- Hacking Tools For Mac
- Hacker Tools Free
- Hacker Security Tools
- Black Hat Hacker Tools
- Nsa Hacker Tools
- Github Hacking Tools
- Hacking Tools Github
- Android Hack Tools Github
- Hacking Tools Pc
- Hacker Tools For Windows
- Pentest Tools Port Scanner
- Hacking Tools Windows
- Top Pentest Tools
- Pentest Tools Nmap
- Hacking Tools For Beginners
- Wifi Hacker Tools For Windows
- Hack Tools
- Pentest Tools For Ubuntu
- Tools 4 Hack
- Tools For Hacker
- Pentest Tools Android
- Pentest Tools Kali Linux
- Pentest Tools List
- What Is Hacking Tools
- Hack Tools For Ubuntu
- Hacker Tools For Ios
- Hackers Toolbox
- Hack Tools
- Hacking Tools For Pc
- Pentest Tools Bluekeep
- Pentest Tools Apk
- Pentest Automation Tools
- Hacker Tools Apk
- Hack Tools For Pc
- Hacking Tools Windows
- Hacker Tools Online
- Pentest Tools For Windows
- Hacking Apps
- Termux Hacking Tools 2019
- Tools For Hacker
- Pentest Tools Linux
- Nsa Hacker Tools
- Pentest Tools For Android
- Growth Hacker Tools
- Hacking Tools For Pc
- Hack App
- Hack Tools Download
- Pentest Tools Find Subdomains
- Hacking Tools Windows 10
- Hacker Tools Apk
- Hack Tools For Games
- Hacker Security Tools
- How To Hack
- Hackrf Tools
- Pentest Tools Nmap
- Pentest Automation Tools
- Pentest Tools Nmap
- Hack Tools For Windows
- Hacker Tool Kit
- Hacking Tools Mac
- Blackhat Hacker Tools
- Hacking Tools Kit
- Hacker Tools Windows
- Kik Hack Tools
- Hacker Search Tools
- Pentest Automation Tools
- Hacking Tools And Software
- Blackhat Hacker Tools
- Hacker Tools Apk Download
- New Hacker Tools
- Github Hacking Tools
- Hack Tools Pc
- Hacking Tools Github
- Hacking Tools For Games
- Pentest Tools Apk
- Hacking Tools For Windows Free Download
- Underground Hacker Sites
- Hack Tools
- Nsa Hack Tools
- Pentest Tools Open Source