Cross-Site Request Forgery For POST Requests With An XML Body I recently had cause to create a proof-of-concept for a site that seemed to be vulnerable to Cross-Site Request Forgery (CSRF). I say âseemedâ because there was no CSRF protection, but I was finding the XML POST body really hard to forge (It was a SOAP / XMLRPC type request). Eventually Sid from notsosecure.com pointed me in the right
ã¯ããã« ã¯ããã¾ãã¦ããµã¤ãã¼ãã©ã¹ãã®åç°ã§ããSSL ãµã¼ãã¼è¨¼ææ¸ã®ãµãã¼ããã¹ã¯ã§ãã¯ãã«ã«ãµãã¼ãã主ã«æ å½ãã¦ãã¾ãã ãã®ãã³ããããã®ãã¬ãã¸ã«å¯ç¨¿ããã¦ããã ããã¨ã¨ãªãã¾ãããã©ããããããããé¡ããããã¾ãã ãã¦ãä»åã¯ç§ãã客æ§ããããèããããSSL/TLS (以éã¯ãSSL ã ãã«çç¥ãã¦è¨è¼ãã¾ã)ã«é¢ããã話ã以ä¸ã® 2 æ¬ç«ã¦ã§ãç´¹ä»ãã¾ãã SHA-1 証ææ¸ã®è¦å¶ã»å½±é¿ã®æ¯ãè¿ãã¨ææ°åå SSL æ¥ç¶æã«ããããã»ãã¥ãªãã£è¦åã»ã¨ã©ã¼ã¨ãã®å¯¾ç ãªããSSL ã«é¢ããåºæ¬çãªã話ã¯å½ç¤¾ã®åæ¬ãå¯ç¨¿ãã¦ãããæ¹ãã¦ç¥ãããSSLãµã¼ãã¼è¨¼ææ¸ã¨ã¯ï¼ãã·ãªã¼ãºããä¸èªãã ããã 第 1 é¨ï¼ SHA-1 証ææ¸ã®è¦å¶ã»å½±é¿ã®æ¯ãè¿ãã¨ææ°åå SHA-1 証ææ¸ã®è¦å¶ã®æ¯ãè¿ã ã¾ããSHA-1 証ææ¸ï¼ç½²åã¢ã«ã´ãªãºã ã SHA-1 ã® SSL
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}