You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Installing modules using Cross-Site Request Forgery (CSRF)
It's possible to install and run arbitrary modules using CSRF.
Even though the port that the control channel listens to is random in a
range, it's possible to fire off post requests to get the browser to
install a module of your choice and execute on the users system. I
believe the goal is to sandbox these modules at some point, but for now
the whole api is available.
Here is an example video of me using this with a reverse shell to get it
to work.
It's a bit contrived because I'm not brute forcing the port but it's
possible todo that and get it to work. Standard express CSRF measures
could maybe be used, or maybe use file sockets instead of tcp sockets
for communication?
The text was updated successfully, but these errors were encountered:
As reported by Adam from andyet.net over email:
The text was updated successfully, but these errors were encountered: