Web application security - the fast guide Chapter 5: Attack Execution - the client | Page 18
Hashed Hidden Fields
Attack requirement:
1. Application developer falsely
depends on the Referer
Header to check the page
from which the request id
originated.
Send Request to a
privileged page
faking Referer
Header
Attack process
1. Using a proxy capture a
request heading to restricted
page.
2. Alter the Referer Header to
match a page with the same
or higher authority level
3. Release the altered request.
2017-05-10
Attacker page
Send privileged response
Application
because application
considered it is a local
request from trusted page
Server
Web Application Security Fast Guide (book slides)
By Dr.Sami Khiami
Slide 18