DEV Community

DaNeil C
DaNeil C

Posted on • Edited on

Port Swigger Academy CTF - Validation of CSRF token depends on request method

Today we take another adventure into Post Swigger's Web Security Academy and their process.
The nice thing about this is that it feels more practical. There are no "flags" like traditional CTFs. This is all focused on practical outcomes and actual issues.
The annoying thing is that it gives no hints as to how to start and no hints if you get stuck. There is a solution part that I have yet to look at this while writing it so I cannot say how it is.


  • CTF Name: Validation of CSRF token depends on request method
  • Resource: Port Swigger Academy
  • Difficulty: Easy
  • Number of Flags: 1

Flag0

  • Hint: This lab's email change functionality is vulnerable to CSRF. It attempts to block CSRF attacks, but only applies defenses to certain types of requests.
  • Acquired By: To change the users email address simply log in with the creds that were given (carlos/ montoya). (The first bit is the same as previous but this is practice so here we go.)
    • Once logged in, navigate to the "change email" tab Alt Text
    • Now lets see what it happen in the page source and the network. Alt TextAlt Text There isn't much going on here. The only thing being sent in the network body is the form data with an email address that will be changed. It is a "POST" method and there is a cookie in the Request header. (You can also see this in BurpSuite but the network tab is just as easy and no proxy needed.) Alt Text
    • Now jump over to the "exploit server" at the top of the page and craft the body of the exploit. Below you can see that I took the code they had in the main info part and changed it a bit for my instance. Alt Text
    • Now save it via the "store" button as this will automatically launch it and you pass the lab.
  • Thoughts:This took me a minute to wrap my head around what exactly they were wanting. For this lab you need to be in their environment and there is really only one way to solve it. Utilize their "exploit server" with the correct body. I originally was trying to run this exploit by crafting a .html page myself but that wasn't working. So far it seems that they want you to use their exploit server system to solve the task but it still shows a practical use of the process.

Learned

CSRFs can not look like much but can be very costly if executable. When successful a CSRF attack causes the victim to carry out an action unintentionally and depending on the nature of the action, the attacker might be able to gain full control over the user's account.

A way to protect against this attack?

A common practice to avoiding this attack is by having a CSRF Token.
But, be careful not to expose this token as that can help the attack.


Happy Hacking

Resource:
  1. https://portswigger.net/web-security/csrf
  2. https://owasp.org/www-project-cheat-sheets/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
Please Note that I am still learning. If something that I have stated is incorrect please let me know. I would love to learn more about what I may not understand fully.

Top comments (0)