[<prev] [next>] [day] [month] [year] [list]
Message-ID: <50720069.7030604@defensecode.com>
Date: Mon, 08 Oct 2012 00:21:29 +0200
From: DefenseCode <defensecode@...ensecode.com>
To: full-disclosure@...ts.grok.org.uk
Subject: JSON-RPC Cross-Site Request Forgery little
exploitation trick
Hi,
During penetration-test contract, we came across CSRF in JSON-RPC based
web application.
Brief google search revealed some people saying that CSRF in JSON is hard
to exploit, and that these vulnerabilities can be ignored.
In fact, it's not that hard to exploit...
Here is how we exploited it - little trick about CSRF attacks on
JSON-RPC based web applications.
Maybe it'll be useful to someone.
http://blog.defensecode.com/2012/09/cross-site-request-forgery-against.html
Regards
--
DefenseCode Team
ThunderScan - Audit your Web Application Source Code For Vulnerabilities
http://www.defensecode.com/subcategory/thunderscan-8
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists