DVWA-3.4 CSRF(跨站请求伪造)-Impossible
Posted zhengna
tags:
篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了DVWA-3.4 CSRF(跨站请求伪造)-Impossible相关的知识,希望对你有一定的参考价值。
Impossible Level
查看源码
<?php if( isset( $_GET[ ‘Change‘ ] ) ) { // Check Anti-CSRF token checkToken( $_REQUEST[ ‘user_token‘ ], $_SESSION[ ‘session_token‘ ], ‘index.php‘ ); // Get input $pass_curr = $_GET[ ‘password_current‘ ]; $pass_new = $_GET[ ‘password_new‘ ]; $pass_conf = $_GET[ ‘password_conf‘ ]; // Sanitise current password input $pass_curr = stripslashes( $pass_curr ); $pass_curr = ((isset($GLOBALS["___mysqli_ston"]) && is_object($GLOBALS["___mysqli_ston"])) ? mysqli_real_escape_string($GLOBALS["___mysqli_ston"], $pass_curr ) : ((trigger_error("[MySQLConverterToo] Fix the mysql_escape_string() call! This code does not work.", E_USER_ERROR)) ? "" : "")); $pass_curr = md5( $pass_curr ); // Check that the current password is correct $data = $db->prepare( ‘SELECT password FROM users WHERE user = (:user) AND password = (:password) LIMIT 1;‘ ); $data->bindParam( ‘:user‘, dvwaCurrentUser(), PDO::PARAM_STR ); $data->bindParam( ‘:password‘, $pass_curr, PDO::PARAM_STR ); $data->execute(); // Do both new passwords match and does the current password match the user? if( ( $pass_new == $pass_conf ) && ( $data->rowCount() == 1 ) ) { // It does! $pass_new = stripslashes( $pass_new ); $pass_new = ((isset($GLOBALS["___mysqli_ston"]) && is_object($GLOBALS["___mysqli_ston"])) ? mysqli_real_escape_string($GLOBALS["___mysqli_ston"], $pass_new ) : ((trigger_error("[MySQLConverterToo] Fix the mysql_escape_string() call! This code does not work.", E_USER_ERROR)) ? "" : "")); $pass_new = md5( $pass_new ); // Update database with new password $data = $db->prepare( ‘UPDATE users SET password = (:password) WHERE user = (:user);‘ ); $data->bindParam( ‘:password‘, $pass_new, PDO::PARAM_STR ); $data->bindParam( ‘:user‘, dvwaCurrentUser(), PDO::PARAM_STR ); $data->execute(); // Feedback for the user $html .= "<pre>Password Changed.</pre>"; } else { // Issue with passwords matching $html .= "<pre>Passwords did not match or current password incorrect.</pre>"; } } // Generate Anti-CSRF token generateSessionToken(); ?>
可以看到,Impossible级别的代码利用PDO技术防御SQL注入,至于防护CSRF,则要求用户输入原始密码(简单粗暴),攻击者在不知道原始密码的情况下,无论如何都无法进行CSRF攻击。
参考:https://www.freebuf.com/articles/web/118352.html
以上是关于DVWA-3.4 CSRF(跨站请求伪造)-Impossible的主要内容,如果未能解决你的问题,请参考以下文章