Lab: CSRF where token is tied to non-session cookie
tags: Portswigger Web Security Academy
Web
- Description: This lab’s email change functionality is vulnerable to CSRF. It uses tokens to try to prevent CSRF attacks, but they aren’t fully integrated into the site’s session handling system.
-
Goal: To solve the lab, use your exploit server to host an HTML page that uses a CSRF attack to change the viewer’s email address. You have two accounts on the application that you can use to help design your attack. The credentials are as follows:
wiener:peter
carlos:montoya
- Hint:
Recon
-
Username:
wiener
Session:
XdagGBS9LPa7P1t3m5sxhxNdGNSF567a
CSRF Key:liMgrTpwX5psfFRMCHyzuuH6GDT0va5v
CSRF Token:ZZYoEyE0OQqp1rvb6XCgs4Uz9us4OCgG
Something interesting: when I logout and re-login again, the session changed and the others data are the same
-
Username:
carlos
Session:
eblGI5f9PddGlEpYdJvsIUe6chNkLjrd
CSRF Key:liMgrTpwX5psfFRMCHyzuuH6GDT0va5v
$\to$ The same withwiener
CSRF Token:ZZYoEyE0OQqp1rvb6XCgs4Uz9us4OCgG
$\to$ The same withwiener
Exp
:::spoiler Success Screenshot
:::
Reference
Writeup: CSRF where token is tied to non-session cookie @ PortSwigger Academy