1
2
Fork 0
mirror of https://github.com/carlospolop/hacktricks.git synced 2023-12-14 19:12:55 +01:00

GitBook: [master] one page modified

This commit is contained in:
CPol 2020-08-10 09:56:57 +00:00 committed by gitbook-bot
parent 8aa743edcc
commit 5dbd8b749c
No known key found for this signature in database
GPG key ID: 07D2180C7B12D0FF

View file

@ -71,6 +71,10 @@ If the web site contains any **behaviour** that **allows an attacker to set a co
In a further variation on the preceding vulnerability, some applications do not maintain any server-side record of tokens that have been issued, but instead **duplicate each token within a cookie and a request parameter**. When the subsequent request is validated, the application simply verifies that the **token** submitted in the **request parameter matches** the value submitted in the **cookie**.
In this situation, the attacker can again perform a CSRF **attack if the web site contains any cookie setting functionality**.
### Content-Type change
You can change to POST Content-Type to _**application/json, application/x-url-encoded**_ or _**form-multipart**_ and maybe you will be able to bypass the CSRF token.
### Referrer / Origin check bypass
#### Avoid Referrer header