DE

What Is Cross-Site Request Forgery (CSRF) & How to Prevent It

In this article:

What is Cross-Site Request Forgery (CSRF)?

This type of attack, also known as CSRF or XSRF, Cross-Site Reference Forgery, Hostile Linking, and more, allow an attacker to carry out actions (requests) within an application where a user is currently logged in. It is “cross-site” or “cross-origin” because it uses different websites or elements to interfere, i.e., to send requests within an application that originate from outside of the application.

A CSRF sends an HTTP request whenever a user opens a website containing malicious code to achieve its aim. The code is embedded so that no further actions by the user are required. 

This kind of attack is widely used in spam emails. The attack starts without the user’s knowledge and forges actions by clicking on a malicious URL. The HTTP requests sent without the user’s knowledge may access, modify or delete sensitive data.

While CSRF attacks mainly occur through users’ browsers, they can effectively be executed through any file that allows scripting, including word and XML documents, RSS feeds, and more. 

In this article, you’ll find everything about these attacks, but… if you don’t have enough time to read, check our CSRF Scanner to discover Cross-Site Request Forgery vulnerabilities you could be exposed to (it takes just 2 minutes to scan your web app, and it’s for free!).



CSRF Security Assessment Level

Cross-Site Request Forgery (CSRF) Security Assessment

CVSS Vector: AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

How does a CSRF attack work?

CSRF works by an attacker gaining access to a victim’s browser – typically through a malicious link. That access is then used to make a malicious request to any application with an active session in which the user is authenticated. 

Because the attacker has access to the browser, applications’ requests are seen as legitimate because they are sent along with the session cookie that allows the request to occur. 

For a CSRF to have an effect and be meaningful, several conditions must be present:

  • There must be an action that the attacker wants to execute on behalf of the victim that will provide the attacker with some benefit (i.e., gain access to and change a victim’s password)
  • The application must use session cookies to authenticate the request made by the user
  • The attacker knows the parameters of the requests he wants to perform

A cross-site request forgery is typically executed in one of the ways described below.

GET Requests

Some applications use HTTP GET requests to perform state changes, such as changing a password. In this case, an attacker will send a malicious link (that mimics an ordinary one). A script that triggers the browser to perform the request is executed when a user visits the link. 

Alternatively, the attack may be executed by sending victims to a page that loads the address through an HTML element, such as an image.

In either instance, the browser’s GET request will be executed in the background to achieve the desired result without indicating to the user that this has occurred. Thus, CSRF GET request exploits are relatively trivial but still appear as vulnerabilities in different applications.

POST Requests

The main difference between using a GET and POST request for a CSRF is how the request is submitted. Attackers use HTTP POST because state-changing requests in applications are frequently made in this way. 

Unlike GET, where the attack is achieved through a URL containing the request, the victim’s browser sends the desired values through the request body with a POST request. These are typically encoded in the form of a query string.

An attacker may use the <form> element to submit this request, requiring the user to submit the request manually. This can be achieved by tricking the victim into clicking on a button on the malicious website to which they are led. Alternatively, the attacker may embed JavaScript in the website, executing the form request automatically.

The same result can also be achieved by using an iFrame embedded as a hidden field by the attacker. Much like with JavaScript, the iFrame can be created to send the request as soon as it is loaded on the website.

Other Requests

Another way a CSRF can be successful is by using different HTTP elements such as PUT or DELETE. These can be submitted as part of a JSON or XML string but are prevented by modern browsers by default because of the same-origin policy (SOP) restrictions and cross-origin resource sharing (CORS). For such a request to be allowed, these restrictions must have been manually removed on a website, allowing it to receive requests with different origins. 

A CSRF can also be executed as part of a cross-site scripting (XSS) attack. In this case, the CSRF will be part of the payload attached to the XSS, like with the famous Samy worm used in MySpace.

Cross-Site Request Forgery CSRF in a graph

What is the impact of a CSRF attack?

The impact of a CSRF attack depends on the targeted user and their privileges within an application. 

For the average user, a successful CSRF attack will typically introduce state-changing requests such as their password or email address being changed, their funds being transferred to another account, or purchases being made with their credentials. 

If a user with higher privileges, such as an administrative account, is successfully targeted, a CSRF may result in a full-blown system compromise. This is because such an account can submit requests for a different order.

Are Cross-Site Request Forgery and Cross-Site Scripting the same?

CSRF and XSS are different types of attacks, though they can be used in concert. Both of them are common JavaScript vulnerabilities.

For CSRF to work, the user must currently authenticate in an application through which the attacker can send a request. It is considered a ” one-way ” attack because requests can only be shipped with CSRF but not received; it is considered a “one-way” attack. This attack exploits an application or website’s trust for the user.

On the other hand, XSS does not require authentication but only for the user to visit a particular website on which the XSS script is then executed within the user’s browser. Because it allows for requests to be sent and received, so it is considered a “two-way” attack or vulnerability. This attack exploits the trust that a user has in the website.

Best Practices to prevent CSRF Vulnerabilities

Prevention Guide

CSRF prevention guide

Learn how to detect and prevent the Cross-Site Request Forgery. Download this guide for free.

Download

How to Prevent Cross-Site Request Forgery Attacks

To prevent CSRF injection attacks, you must ensure that an attacker cannot craft an arbitrary request run in the security context of any other user and send from a different website. This is one of the main conditions that need to be in place for a CSRF attack to be successful. Disrupting this condition prevents the possibility of such an attack.

Token-based prevention

As stated by the OWASP Cross-Site Request Forgery Prevention Cheat Sheet, the most common mitigation technique for cross-site request forgery attacks is using a CSRF token (also known as a synchronizer token or anti-CSRF token). These session tokens are unpredictable and unique values generated by the application and sent to the client. After that, they are sent back in the request made by the client to the server, which verifies the request. 

This introduces an unknown element that can effectively defuse the CSRF attack. Any request not originating from the original form will not include the correct value for the CSRF token and can be easily discarded. 

Common CSRF token vulnerabilities

Yet, some vulnerabilities can arise in using CSRF tokens due to omissions in the procedure. The most common CSRF token vulnerabilities include:

  • Tokens are validated and used only when POST requests are made and not when GET requests are made
  • Validation occurs only if the session token is present, and if it is omitted, validation is also skipped
  • Tokens are not tied to the current user session but are compared to tokens issued at any point by the application
  • Tokens are tied to a cookie but not one that is used to track the current session
  • Applications do not maintain a record of tokens – instead, the token is included in the cookie and the application verifies that the token in the request is the same as the one in the cookie

All of the above constitute vulnerabilities that can open the door to a CSRF attack. To defend against such an attack, CSRF tokens need to be implemented correctly, along with several other mitigation techniques.

When using modern frameworks, tokens-based CSRF protection is typically included or can easily be added to forms and validated by the corresponding middleware. Furthermore, for single-page applications, the CSRF token may be provided by a meta tag which is then read from the JavaScript in the browser and amended to every request. 

A double-submit cookie token approach can be used if using a valid token on the server side is impossible. In this cookie-based session handling, when a user visits a website, the site generates a value that stores as a cookie on the user’s device, apart from the cookie that serves as a session identifier.

When a legitimate request is submitted to the site, it must contain the same value as included in the cookie. The server then verifies this, and the request parameter is accepted if the values match.

As recommended by OWASP, this approach should be used together with a CSRF token strategy and not as a substitute. 

The same-site cookie approach restricts the origin from which a cookie can be sent. Thus, CSRF exploits the possibility of making a cross-origin request (and hence same-site cookies). Limiting requests so that they can only be sent from the origin to which a cookie is related prevents the ability to send external requests to an application.

Custom request header

A technique that is particularly effective for AJAX or API endpoints is the use of custom request headers. In this approach, JavaScript is used to add a custom header. Unfortunately, JavaScript can’t make cross-origin requests with a custom header because of the SOP security restrictions.

This prevents sending a cross-domain request with custom headers, thereby eliminating the possibility of a CSRF attack.

Django

Django is similarly easy to protect any form by a CSRF-Token using the snippet within the <form></form> tags.

{% csrf_token %}

To provide the token for use with JavaScript requests, retrieve it from its storage cookie and add it to the request.

var csrftoken = Cookies.get('csrftoken');
...
xhr.setRequestHeader("X-CSRFToken", csrftoken);

Please refer to the Django documentation for more detailed examples.

Laravel

To protect forms in Laravel, include the following code within the <form></form> tags.

{{ csrf_field() }}

For JavaScript requests, the file resources/assets/js/bootstrap.js automatically configures the csrf-token meta tag, which the Axios HTTP library will use. If you are not using this library, check the Laravel documentation for more information.

Summary

Crashtest Security offers a state-of-the-art Cross-Site Request Forgery CSRF Scanner that allows you to easily detect vulnerabilities and take necessary precautions to prevent using this method when someone tries to hack you. Do check it out. It is free.

Videos About CSRF/XSRF

Video about what CSRF is
Video about how to best prevent CSRF

Get a quick security audit of your website for free now

We are analyzing https://example.com
Scanning target https://example.com
Scan status: In progress
Scan target: http://example.com/laskdlaksd/12lklkasldkasada.a
Date: 30/09/2022
Crashtest Security Suite will be checking for:
Information disclosure Known vulnerabilities SSL misconfiguration Open ports
Complete your scan request
Please fill in your details receive the
quick security audit by email.
Security specialist is analyzing your scan report.
То verify your identity please provide your phone/mobile:
Thank you.
We have received your request.
As soon as your security audit is ready, we will notify you.