Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

Encyclopedia / Encyclopedia Part 6 /

What Is Cross-Site Request Forgery?

Even though it's one of the lesser known security hole variants, it doesn't follow that the cross-site request forgery (CSRF or XSRF) is not hazardous or threatening, because it truly is. It's even part of the top ten OWASP website vulnerabilities in existence to boot. Don't let the fact that it's an unpopular vulnerability lead you into underestimating its capabilities, because it can cripple entire systems beyond repair. What's more, the fact that many people don't even know that this code flaw exists is what makes it such a deadly force. It's indeed a mystery why hackers don't make use of this susceptibility more, especially in light of the fact that most websites out there are prone to this attack type.

Exploitable Vulnerabilities

The malicious exploit known as CSRF or XSRF involves a hacker sending valid orders to a site from a user without said user's permission. The attacker basically commandeers the victim's web browser in order to make sending legitimate requests possible. The commands are sent via the user's browser with him none the wiser. XSRF is also referred to by hackers as session riding because the one doing the hacking is actually using the session of the user in order to send those commands or requests in the first place. Moreover, this shouldn't be confused with cross-site scripting or XSS, because these two exploitable vulnerabilities are mutually exclusive from each other.

Surfing Web in Real Time

To be more specific, fixing potential XSS security holes won't fix problems concerning XSRF and vice-versa. Just because they both contain the words "cross" doesn't mean they're the same thing. Do not be fooled into thinking that XSS protection equals XSRF protection. XSRF exploits the trust of a website on whatever requests are delivered from the user's browser, while XSS exploits the trust of a client for an application or website. Also, XSRF only works when a user has his web browser open and he's surfing the web in real-time, because it's his browsing session that's being used to make it appear the legitimate orders are being forwarded by him.

Compromise Trusted Website

XSRF is all about tricking a website into thinking that all requests made by a user's browser are safe, even though the exploit proves otherwise. What's more, the XSRF attack involves three important elements. First, the malicious website, then the trusted website, then the victim; the trusted website is the website that's tricked into thinking the victim is sending requests even though his session was hijacked by a hacker. Meanwhile, the malicious website is the one that injects HTTP requests and malicious code that will ultimately compromise the trusted website's overall security. Scan your Website with Security Scanner.
cloud vulnerability scanner

➤ Related pages
Advantages of Proxy Servers?
Ethical Hacking Penetration?
Network Security Scanner?
Risk Management
Use Network Security Scanner?
What Is A Proxy Server For?
What Is Cross Site Scripting or XSS?
What Is Cross-Site Request Forgery?
What Is HTTP Header Injection?
What Is Open Redirection?
What Is XSS Cross-Site Scripting?

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef