All,

I'm looking for thoughts on CSRF attacks that result in forged headers from the victim user to the target site. Are there modern attacks that work here? If not, could we implement a CSRF protection that uses a custom header and avoid the cost of computing random numbers? This sounds very strange at first since we are accustomed to the standard random CSRF token approach. However, please take a look and contribute to the comment thread:

http://michael-coates.blogspot.com/2010/05/csrf-attacks-and-forged-headers.html

(Several comments on the article already, I encourage you to post your comments there for everyone to read)

Thanks!

--
Michael Coates
http://michael-coates.blogspot.com
OWASP Member&  Contributor

_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________

Reply via email to