Page 112 - Hands-On Bug Hunting for Penetration Testers
P. 112

CSRF and Insecure Session Authentication                                    Chapter 6

            But if the intent is to deceive the target of the CSRF attack into doing what we want d
            unwittingly changing Mandella's rank d why are we showing them? Why offer the user a
            chance to see or manipulate the OJDL input field at all? See the following:

                 IUNM
                     GPSN FODUZQF  BQQMJDBUJPO Y XXX GPSN VSMFODPEFE  NFUIPE  1045
                BDUJPO  IUUQ   XFCTDBOUFTU DPN DSPTTUSBJOJOH BCPVUZPV QIQ
                         MBCFM GOBNF  MBCFM  JOQVU UZQF  UFYU  WBMVF  8JMMJBN
                OBNF  GOBNF
                         MBCFM OJDL  MBCFM  JOQVU UZQF  UFYU  WBMVF  1SJWBUF .BOEFMMB
                OBNF  PUIFS OJDL
                         MBCFM MOBNF  MBCFM  JOQVU UZQF  UFYU  WBMVF  .BOEFMMB
                OBNF  MOBNF
                         MBCFM TVCNJU  MBCFM  JOQVU UZQF  UFYU  WBMVF  TVCNJU
                OBNF  TVCNJU
                         JOQVU UZQF  TVCNJU
                WBMVF  IUUQ   XFCTDBOUFTU DPN DSPTTUSBJOJOH BCPVUZPV QIQ
                         JOQVU UZQF  IJEEFO  WBMVF  .BKPS .BOEFMMB  OBNF  OJDL
                      GPSN
                  IUNM

            In this last snippet, we've changed the name of the PUIFS OJDL input field with the OJDL
            label our hapless user is expecting, while making the real OJDL input hiddenbwhich
            contains our secret value, the rank we think the major deserves.

            Of course, when you're creating a CSRF PoC as part of a bug-report submission, you want
            to make sure you're not actually changing or modifying sensitive information (such as a
            password or transaction amount), though it can be useful to make a small alteration in
            order to illustrate the possible impact of the bug.


            Validating Your CSRF PoC

            Now that we've created a basic CSRF PoC, we can go about applying it to prove the
            presence of a CSRF vulnerability.
















                                                    [ 97 ]
   107   108   109   110   111   112   113   114   115   116   117