preview

The Threats of Cross-Site Request Forgery and Cross-Site Scripting

Decent Essays

One click; that is all it takes for hackers to steal the information they desire. As the Internet continues to grow with new web applications, associated security threats also grow. Two of the most common, and dangerous, threats to web applications are Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (CSS); in fact, both threats appear in the 2013 OWASP Top 10 list of critical security risks. Understanding the threat of CSRF and CSS is essential to reducing the risk faced by users and developers of web applications.
CSRF
Cross-Site Request Forgery (CSRF) is an attack technique that exploits browser and HTTP weaknesses to send unauthorized requests to a web server using end-user credentials (Maes, Heyman, Desmet, & Joosen, 2009). Often, as a convenience, web applications will store end-user information in cookies managed by a browser; when a web application finds this data in the browser, it is assumed to be coming from a trusted source (Maes, et al., 2009). This trust, however, is the main exploit of a CSRF attack. Once a hacker gets access to an end-user browser, any web application storing credentials in the browser becomes vulnerable to attack (Maes, et al., 2009). This access is typically gained through URL manipulation or injecting hidden form fields into a web page using Cross-Site Scripting.
CSS
Another attack exploiting trust is Cross-Site Scripting (CSS). CSS works by adding malicious HTML, JavaScript, or other client-side scripts to a web application

Get Access