Berner Fachhochschule, Technik und Informatik
Advanced Web Technology 10) XSS, CSRF and SQL Injection
- Dr. E. Benoist
Fall Semester 2010/2011
Advanced Web Technology 10) XSS, CSRF and SQL Injection 1
Table of Contents
- Cross Site Request Forgery - CSRF
Presentation Vulnerability CSRF allows to access the intranet Protection Conclusion
- Injection Flows
Presentation Vulnerability Protection Examples Conclusion
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Cross Site Request Forgery
◮ Not a new attack, but simple and devastating ◮ CSRF attack forces a logged-on victim’s browser to send
a request to a vulnerable web application
◮ Target: Perform the chosen action on behalf of the
victim
Advanced Web Technology 10) XSS, CSRF and SQL Injection Cross Site Request Forgery - CSRF 3
Sending a request without the consent of the victim?
◮ Insert an image in a HTML file
<img src=”http://www.benoist.ch/image/test.gif”> Browser: Downloads an image GET /image/test.gif HTTP/1.1 ...
◮ An image can be generated by a PHP program (or any
program) <img src=”http://www.benoist.ch/image/test.php”> Browser: Downloads an image
Advanced Web Technology 10) XSS, CSRF and SQL Injection Cross Site Request Forgery - CSRF: Presentation 4