Automated detection of CSRF-worthy HTML forms through 4-pass reverse-Diff analysis
Page 1 of 1
Automated detection of CSRF-worthy HTML forms through 4-pass reverse-Diff analysis
Abstract
In general, the majority of vulnerability detection techniques depend on fairly simple injections of strings and subsequent blind pattern matching of the body of the induced HTTP response.These vulnerabilities include, but are not limited to, XSS, SQL Injection, File Inclusion which require no awareness of context but straightforward brute-force.However,there are types of vulnerabilities like Blind SQL Injection and Cross-Site Request Forgery (CSRF or XSRF) that do require a certain awareness of the context under which the audit and discovery occurs. In the case of CSRF even this is not enough as CSRF, due to its abstract nature, covers a great range of scenarios, most of them completely benign.Thus, automated CSRF detection traditionally creates a great deal of noise.This paper is aimed towards demonstrating a fairly simple technique, dubbed “4-pass rDiff CSRF detection”, in order to diminish such noise by easing the process of context establishment, i.e. allow Web Application Security Scanners to determine which HTML Form elements are worthy of being reported as vulnerable to CSRF.
Download PDF
In general, the majority of vulnerability detection techniques depend on fairly simple injections of strings and subsequent blind pattern matching of the body of the induced HTTP response.These vulnerabilities include, but are not limited to, XSS, SQL Injection, File Inclusion which require no awareness of context but straightforward brute-force.However,there are types of vulnerabilities like Blind SQL Injection and Cross-Site Request Forgery (CSRF or XSRF) that do require a certain awareness of the context under which the audit and discovery occurs. In the case of CSRF even this is not enough as CSRF, due to its abstract nature, covers a great range of scenarios, most of them completely benign.Thus, automated CSRF detection traditionally creates a great deal of noise.This paper is aimed towards demonstrating a fairly simple technique, dubbed “4-pass rDiff CSRF detection”, in order to diminish such noise by easing the process of context establishment, i.e. allow Web Application Security Scanners to determine which HTML Form elements are worthy of being reported as vulnerable to CSRF.
Download PDF
andry- Moderator
- Posts : 467
Join date : 2010-05-07
Similar topics
» Why Crack When You Can Pass the Hash?
» What is REVERSE SEO and what is its significance?
» Facebook CSRF and XSS vulnerabilities
» Zozzle: Low-overhead Mostly Static JavaScript Malware Detection
» FINDING RULES FOR HEURISTIC DETECTION OF MALICIOUS PDFS
» What is REVERSE SEO and what is its significance?
» Facebook CSRF and XSS vulnerabilities
» Zozzle: Low-overhead Mostly Static JavaScript Malware Detection
» FINDING RULES FOR HEURISTIC DETECTION OF MALICIOUS PDFS
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum