• Browse topics
Login
Login

SNYK LEARN LOGIN

OTHER REGIONS

For Snyk Enterprise customers with regional contracts. More info

Cross site request forgery (CSRF)

Combining malicious code and social engineering

JavaScript

CSRF: the basics

What is CSRF?

Cross site request forgery (CSRF) is a vulnerability where an attacker performs actions while impersonating another user. For example, transferring funds to an attacker’s account, changing a victim’s email address, or they could even just redirect a pizza to an attacker’s address!

Some form of social engineering, like phishing or spoofing, is usually required for this kind of attack to be successful. The attacker typically needs to trick the user into visiting a malicious website for the attack to take place. This malicious website would then contain a request to the targeted website. If the user is authenticated by the targeted website, the request is executed. This attack works because the user's cookies are automatically included in the modified request to a legitimate application. CSRF vulnerabilities occur when vulnerable web apps simply trust the cookies sent by web browsers without further validation.

About this lesson

In this lesson, we will step into the shoes of a financially motivated attacker and craft a CSRF attack on an unsuspecting user trying to complete a bank transfer. After that, we’ll dive into why this attack was possible, covering topics like the Same Origin Policy and SameSite cookies. We will finish by implementing CSRF tokens and SameSite Cookies.

FUN FACT

Tiktok CSRF

TikTok was affected by a CSRF vulnerability in 2020! It was part of two vulnerabilities that allowed for a one-click account takeover. The vulnerable endpoint allowed the researcher to set a new password on any account that used third-party apps to sign up.

CSRF in action

A web application is vulnerable to CSRF if it relies on session cookies to identify users, and doesn’t have any other mechanism for validating requests. Additionally, the request we want to exploit needs to have predictable request parameters so that we can create our own request, like the one in this example.

Luckily for us, we’ve been tipped off about a vulnerable banking application called “Saturn Bank”. This app simply uses session cookies to verify requests. Additionally, the session cookies don’t have the SameSite attribute. We’ll deep dive into what this attribute is later, in short they control how cookies are submitted in cross site requests.

Testing for CSRF

  • STEP 1
  • STEP 2
  • STEP 3
  • STEP 4
  • STEP 5

Setting the stage

Let's build our malicious website. This site will host a form used to trigger a POST request to the bank with our information and the attack.

Start

CSRF under the hood

What just happened?

Behind the scenes, when our victims visited our malicious site “saturnbankgiveaway.com”, a POST request was triggered and sent off to the legitimate Saturn Bank application. The JavaScript sitting in the “script” tags ensures that the form is submitted as soon as the user loads the page, without any user interaction required, or the user even noticing what is happening.

The form above creates the following request to the legitimate Saturn Bank application. The request contains the legitimate user’s session cookie, but contains our bank account number!

POST /transfer HTTP/1.1
Host: saturnbank.com
Content-Length: 42
Content-Type: application/x-www-form-urlencoded
Cookie: session=OM19vamvikL4yvPQfTqrcjW2ItpDAkDm
bsb=421314&accountNo=1736123125&amount=100

CSRF Walkthrough

This attack was possible due to a few conditions:

  • The user was logged into Saturn Bank
    • The user that visited our site was also logged into the Saturn Bank application. Their session cookie was being stored in their browser, and since it had no SameSite attribute, we were able to steal it for our request
  • A state-changing, sensitive ‘Action’ in the vulnerable app
    • This banking application has a beneficial action for attackers. Being able to control a bank transfer is certainly an attractive proposition!
  • Sole reliance on session cookies
    • The application doesn’t perform adequate checks to identify a user. It relies solely on the request containing a session cookie
  • Standard request parameters
    • There is no unique parameter in the request that the attacker can’t determine. This makes it highly repeatable and does not require prior knowledge from the attacker’s perspective. For example, if our bank transfer request requires a renewed authentication by asking for the password, attackers cannot perform the CSRF attack

Scan your code & stay secure with Snyk - for FREE!

Did you know you can use Snyk for free to verify that your code
doesn't include this or other vulnerabilities?

Scan your code

CSRF mitigation

These mitigation techniques can help you defend against CSRF attacks. For simplicity and readability, the following example uses a NodeJS / Express server.

CSRF tokens

One mitigation strategy is to use a random and unique token for use in HTTP requests; these are called CSRF, anti-forgery or request verification tokens. They’re a shared secret between the client and server-side of an application, and are included in any requests the client makes to the server. The server validates the token on each request to ensure it’s still the authorized user making the request. The token is usually contained in a hidden field of an HTML form. As the token is random and unique, the attacker cannot predict the value for use in their malicious request.

Major web frameworks like Microsoft ASP.NET 5 Razor have CSRF tokens activated by default or include library functions to help. Refer to the OWASP CSRF Cheatsheet for examples on how to implement it in various languages and frameworks. It is advisable to use these or open source libraries. You can research which libraries to use with Snyk Advisor. To show you the underlying concept, we’ll implement this example with Double CSRF.

Install the csrf-csrf library by running the command below in your terminal:

npm install cookie-parser csrf-csrf

Now add the following line of code to your apps’ main entry point, which might be index.js, app.js, or server.js:

This is now implemented as a “middleware” in your Express application, which is code that executes during the lifecycle of a request. Each session now automatically gets a new CSRF token. The default configuration ensures the validity of the token is checked whenever a POST request is received.

Next, you’ll need to add the CSRF token to each form in your application, you can get it by calling generateToken(response) and pass it to the res.render() function. To fix the transfer form sent from the Saturn Bank application, update the code to reflect the below:

Additionally you’ll need to use csrfProtection as a middleware for each POST request in the application like:

SameSite cookies

Another way you can defend against CSRF is through applying the SameSite attribute to cookies. This attribute is added to the Set-Cookie response header and can be given either the “Strict” or “Lax” values. For example:

Set-Cookie: SessionId=sYMnfCUrAlmqVVZn9dqevxyFpKZt30NN; SameSite=Strict;

The “Strict” value ensures that the browser does not include the cookie in any requests that originate from another site.

The “Lax” value causes the browser to only include the cookie if the request is a GET method and the request was initiated by the user, not scripts.

Saturn Bank uses the “express-session” middleware for session tokens, so we can simply add the following to the session configuration to implement strict SameSite:

Renew authentication for security critical actions

On top, Saturn Bank should also introduce the need to renew authentication whenever a user is doing a security critical action, like changing passwords or transferring money. If you ever wondered why some banking apps or online retailers ask you to login so frequently, So Now You Know.

FUN FACT

How do you pronounce Snyk?

Snyk is short for 'So Now You Know'. There isn't a simple answer as it depends on who you ask! Depending on who you speak with, it is pronounced in different ways. Guy, our CEO and one of the founders, pronounces it the same as 'sneak'. There are others within the team that pronounce it like 'snick' - the noise a lock makes when it is shutting, as it makes you more secure. We don't really mind whichever way you pronounce it, as long as you are finding and fixing your vulnerabilities!

Quiz

Test your knowledge!

Quiz

To prevent CSRF in JavaScript, which of the following cookie settings can help protect web applications by restricting cookies to first-party contexts and blocking third-party usage?

Keep learning

  • If you loved the lesson, don't forget to check out our article about CSRF in our blog
  • You can also have a look at this great video explanation on YouTube

Congratulations

You have taken your first step into learning what CSRF is, how it works, what the impacts are, and how to protect your own applications. We hope that you will apply this knowledge to make your applications safer. Also, make sure to check out our lessons on other common vulnerabilities.