AppSec Knowledge Base

CSRF ATTACKS

The danger of CSRF attacks.

Cross-Site Request Forgery attacks, or CSRF attacks, are a common and potentially devastating vulnerability that can be easily exploited by cyber criminals. In CSRF attacks, hackers induce end users to take actions in an authenticated web application without their knowledge. CSRF attacks tend to focus on actions such as transferring money or changing the email address in an account rather than stealing data.

Here’s how CSRF attacks work: a user enters credentials to log into a secure web application, but then visits another website which hostsCSRF attack code. This malicious script takes advantage of the user’s authenticated credentials to forge a request for the authenticated site, which cannot distinguish between a valid and a forged request. CSRF attacks can be executed from a single click on a hidden iFrameor a malicious link, and users are often unaware that they have been compromised.

While there are a variety of methods for preventing CSRF attacks, the first step is to determine where CSRF vulnerabilities may occur in your software portfolio. That’s where Veracode can help.

Preventing CSRF attacks with Veracode.

Veracode provides on-demand services for micro services,desktop, web and mobile app security testing. As a cloud-based service, our technology is easy to use and prevents developers from having to learn a new tool in order to test applications. Our comprehensive suite of testing services integrates seamlessly with agile and waterfall software development as well as other methodologies, and enables developers to test code at any point in the development process – from inception through production. With Veracode, development teams and organizations can deliver more secure applications while more easily demonstrating SarbOx compliance and compliance with regulatory frameworks.

Veracode solutions for stopping CSRF attacks.

To prevent CSRF attacks, Veracode offers testing services that include:

  • Veracode Static Analysis, a service that scans binaries to identify flaws in code that is written, purchased or assembled, returning highly accurate results quickly and prioritized by severity.
  • Veracode Greenlight, a solution that runs within the developer’s IDE and provides feedback as developers are writing code about potential flaws that could lead to CSRF attacks.
  • Veracode Web Application Scanning, a service that discovers, tests and monitors all public-facing web applications.
  • Veracode Software Composition Analysis, a service for identifying flaws in open source and commercial code.
  • Veracode Vendor Application Security Testing, a service that evaluates the risk in third-party software without requiring access to source code.

Learn more about CSRF attacks and Veracode, or visit Veracode’s AppSec knowledge base to get answers to questions like “What is sequel injection?” and “What is an integrated development environment?”

 

 

contact menu