Skip to content

Commit 7e338d3

Browse files
committed
Modified 13.2.3
1 parent 5b35a14 commit 7e338d3

File tree

1 file changed

+28
-27
lines changed

1 file changed

+28
-27
lines changed

templates/13.2.3.yaml

Lines changed: 28 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -12,34 +12,35 @@ info:
1212
description: |
1313
Verify that RESTful web services that utilize cookies are protected from Cross-Site Request Forgery via the use of at least one or more of the following: double submit cookie pattern, CSRF nonces, or Origin request header checks
1414
15-
requests:
16-
- method: GET
17-
headers:
18-
Referer: "localhost"
19-
path:
20-
- "{{BaseURL}}"
21-
matchers:
22-
- type: status
23-
status:
24-
- 200
15+
http:
16+
- raw:
17+
- |
18+
GET {{BaseURL}} HTTP/1.1
19+
Host: {{Hostname}}
20+
Origin: {{origin_schema}}{{origin_host}}{{origin_port}}
21+
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36
22+
Accept: */*
2523
26-
- method: GET
27-
headers:
28-
Referer: "127.0.0.1"
29-
path:
30-
- "{{BaseURL}}"
31-
matchers:
32-
- type: status
33-
status:
34-
- 200
24+
cookie-reuse: true
25+
payloads:
26+
origin_host:
27+
- 127.0.0.1
28+
- localhost
29+
- '{{resolve("{{FQDN}}")}}'
30+
origin_schema:
31+
- http://
32+
- https://
33+
origin_port:
34+
-
35+
- :80
36+
- :443
37+
attack: clusterbomb
3538

36-
- method: GET
37-
headers:
38-
Referer: "https://owasp.org"
39-
path:
40-
- "{{BaseURL}}"
39+
stop-at-first-match: true
4140
matchers:
42-
- type: status
43-
status:
44-
- 200
41+
- type: dsl
42+
name: 'Access Restriction Bypass Via Origin Spoof'
43+
dsl:
44+
- status_code < 210 && status_code >= 200
45+
- to_number(forbidden_status_code) != status_code
4546
# digest: 490a00463044022070f4561c2092bdad81e89a15d849d699ebb2741ed1ff5bcf25bebf1ed4f0539a0220295e7f521a22950d8f10a94868c80600e89c0471148dac2fa64e23e79e7092ec:236a7c23afe836fbe231d6e037cff444

0 commit comments

Comments
 (0)