CSRF
CSRF Checklist
[ ] Remove Anti-CSRF Token
[ ] No check for the user's Token
[ ] Weak Token
[ ] Reusable token
[ ] Change request method
[ ] Guessable Token
[ ] Bypass referer
[ ] Modifying Parameter Names => POST To GET
[ ] Modifying Parameter Names[
https://example.com/my/dear/api/val/num?_method=PUT](<https://example.com/my/dear/api/val/num?_method=PUT>)*X-HTTP-Method
X-HTTP-Method-OverrideX-Method-Override*[ ] Custom header token bypass|
[ ] Test the request without the **Customized Token and also header.**Test the request with exact same length but a different token.
[ ] CSRF token is verified by a cookie
<aside> 💡 Note that if the csrf token is related to the session cookie this attack won't work because you will need to set the victim to your session, and therefore you will be attacking yourself.
</aside>
Content-Type changeapplication/x-www-form-urlencodedmultipart/form-datatext/plain
Example (from here) of sending JSON data as text/plain:
Last updated