origin-validation-bypass

1 article
sort: new top best
clear filter
0 6/10

The author demonstrates a JSON CSRF vulnerability exploitation technique that bypasses anti-CSRF token validation and origin checks by leveraging HTTP method override functionality. The attack chain involves removing the X-Auth-Token header, converting a PUT request to POST via method override, and crafting a cross-origin AJAX request with a JSON body.

medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details