Advertisement
Guest User

CSRF

a guest
Aug 16th, 2012
715
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
HTML 5 1.94 KB | None | 0 0
  1. HTML form without CSRF protection
  2.  
  3. Vulnerability description
  4. This alert may be a false positive, manual confirmation is required.
  5.  
  6. Cross-site request forgery, also known as a one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts.
  7.  
  8. Acunetix WVS found a HTML form with no apparent CSRF protection implemented. Consult details for more information about the affected HTML form.
  9. This vulnerability affects /formtest/form.cfm.
  10. Discovered by: Crawler.
  11. Attack details
  12. Form name: <empty>
  13. Form action: http://od/formtest/form_action.cfm
  14. Form method: POST
  15.  
  16. Form inputs:
  17.  
  18. token [Hidden]
  19. username [Text]
  20. userpass [Password]
  21. login [Submit]
  22.  
  23.  
  24.  View HTTP headers
  25. Request
  26. GET /formtest/form.cfm HTTP/1.1
  27. Pragma: no-cache
  28. Acunetix-Aspect: enabled
  29. Acunetix-Aspect-Password: 082119f75623eb7abd7bf357698ff66c
  30. Acunetix-Aspect-Queries: filelist;aspectalerts
  31. Cookie: JSESSIONID=84307a2a1f386954cda232165516344e6c30
  32. Host: od
  33. Connection: Keep-alive
  34. Accept-Encoding: gzip,deflate
  35. User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
  36. Accept: */*
  37.  
  38. Response
  39. HTTP/1.1 200 OK
  40. Content-Type: text/html; charset=UTF-8
  41. Server: Microsoft-IIS/7.5
  42. X-Powered-By: ASP.NET
  43. Date: Thu, 16 Aug 2012 16:15:55 GMT
  44. Content-Length: 944
  45.  
  46. View HTML response
  47. Launch the attack with HTTP Editor  
  48. Retest alert(s)  
  49. Mark this alert as a false positive
  50.  
  51. The impact of this vulnerability
  52. An attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application.
  53.  
  54. How to fix this vulnerability
  55. Check if this form requires CSRF protection and implement CSRF countermeasures if necessary.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement