How can CSRF been exploited if the content-type is not plain and the browser as the SOP policy










2















I have a GWT application. The HTTP request is always a POST, and on server side GET methods throw an exception (method not supported). The header on the POST request contains, among other stuff:



Content-Type: text/x-gwt-rpc; charset=UTF-8
X-GWT-Module-Base: xxxxx
X-GWT-Permutation: xxxxxx


Could someone explain me how can someone exploit a CSRF here? Wouldn't the attacker be forging an malicious HTML like this ?



var xhr = new XMLHttpRequest();
xhr.open("POST", 'URL', true);
xhr.setRequestHeader('Content-type', 'text/x-gwt-rpc; charset=utf-8');
xhr.setRequestHeader('X-GWT-Permutation', 'XXXXXX');
xhr.setRequestHeader('X-GWT-Module-Base','XXXXXX');
xhr.send(data);


In that case wherever this page is hosted, since the content-type is not plain or simple, it will produce a cross origin call and the browser (any browser now) will issue an OPTION pre flight request in which case will fail because my app doesn't respond to OPTION and doesn't return Access-Control-Allow-Origin to random websites.



Even we the above protection, how can an attacker find is way around the browser OPTION pre-flight ? Can it be bypassed somehow?










share|improve this question






















  • You can also ask GWT questions from GWT developers here: gitter.im/gwtproject/gwt

    – xybrek
    Nov 13 '18 at 23:16















2















I have a GWT application. The HTTP request is always a POST, and on server side GET methods throw an exception (method not supported). The header on the POST request contains, among other stuff:



Content-Type: text/x-gwt-rpc; charset=UTF-8
X-GWT-Module-Base: xxxxx
X-GWT-Permutation: xxxxxx


Could someone explain me how can someone exploit a CSRF here? Wouldn't the attacker be forging an malicious HTML like this ?



var xhr = new XMLHttpRequest();
xhr.open("POST", 'URL', true);
xhr.setRequestHeader('Content-type', 'text/x-gwt-rpc; charset=utf-8');
xhr.setRequestHeader('X-GWT-Permutation', 'XXXXXX');
xhr.setRequestHeader('X-GWT-Module-Base','XXXXXX');
xhr.send(data);


In that case wherever this page is hosted, since the content-type is not plain or simple, it will produce a cross origin call and the browser (any browser now) will issue an OPTION pre flight request in which case will fail because my app doesn't respond to OPTION and doesn't return Access-Control-Allow-Origin to random websites.



Even we the above protection, how can an attacker find is way around the browser OPTION pre-flight ? Can it be bypassed somehow?










share|improve this question






















  • You can also ask GWT questions from GWT developers here: gitter.im/gwtproject/gwt

    – xybrek
    Nov 13 '18 at 23:16













2












2








2








I have a GWT application. The HTTP request is always a POST, and on server side GET methods throw an exception (method not supported). The header on the POST request contains, among other stuff:



Content-Type: text/x-gwt-rpc; charset=UTF-8
X-GWT-Module-Base: xxxxx
X-GWT-Permutation: xxxxxx


Could someone explain me how can someone exploit a CSRF here? Wouldn't the attacker be forging an malicious HTML like this ?



var xhr = new XMLHttpRequest();
xhr.open("POST", 'URL', true);
xhr.setRequestHeader('Content-type', 'text/x-gwt-rpc; charset=utf-8');
xhr.setRequestHeader('X-GWT-Permutation', 'XXXXXX');
xhr.setRequestHeader('X-GWT-Module-Base','XXXXXX');
xhr.send(data);


In that case wherever this page is hosted, since the content-type is not plain or simple, it will produce a cross origin call and the browser (any browser now) will issue an OPTION pre flight request in which case will fail because my app doesn't respond to OPTION and doesn't return Access-Control-Allow-Origin to random websites.



Even we the above protection, how can an attacker find is way around the browser OPTION pre-flight ? Can it be bypassed somehow?










share|improve this question














I have a GWT application. The HTTP request is always a POST, and on server side GET methods throw an exception (method not supported). The header on the POST request contains, among other stuff:



Content-Type: text/x-gwt-rpc; charset=UTF-8
X-GWT-Module-Base: xxxxx
X-GWT-Permutation: xxxxxx


Could someone explain me how can someone exploit a CSRF here? Wouldn't the attacker be forging an malicious HTML like this ?



var xhr = new XMLHttpRequest();
xhr.open("POST", 'URL', true);
xhr.setRequestHeader('Content-type', 'text/x-gwt-rpc; charset=utf-8');
xhr.setRequestHeader('X-GWT-Permutation', 'XXXXXX');
xhr.setRequestHeader('X-GWT-Module-Base','XXXXXX');
xhr.send(data);


In that case wherever this page is hosted, since the content-type is not plain or simple, it will produce a cross origin call and the browser (any browser now) will issue an OPTION pre flight request in which case will fail because my app doesn't respond to OPTION and doesn't return Access-Control-Allow-Origin to random websites.



Even we the above protection, how can an attacker find is way around the browser OPTION pre-flight ? Can it be bypassed somehow?







gwt csrf option






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Nov 13 '18 at 11:05









MarcoMarco

867




867












  • You can also ask GWT questions from GWT developers here: gitter.im/gwtproject/gwt

    – xybrek
    Nov 13 '18 at 23:16

















  • You can also ask GWT questions from GWT developers here: gitter.im/gwtproject/gwt

    – xybrek
    Nov 13 '18 at 23:16
















You can also ask GWT questions from GWT developers here: gitter.im/gwtproject/gwt

– xybrek
Nov 13 '18 at 23:16





You can also ask GWT questions from GWT developers here: gitter.im/gwtproject/gwt

– xybrek
Nov 13 '18 at 23:16












0






active

oldest

votes











Your Answer






StackExchange.ifUsing("editor", function ()
StackExchange.using("externalEditor", function ()
StackExchange.using("snippets", function ()
StackExchange.snippets.init();
);
);
, "code-snippets");

StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "1"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













draft saved

draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53279641%2fhow-can-csrf-been-exploited-if-the-content-type-is-not-plain-and-the-browser-as%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown

























0






active

oldest

votes








0






active

oldest

votes









active

oldest

votes






active

oldest

votes















draft saved

draft discarded
















































Thanks for contributing an answer to Stack Overflow!


  • Please be sure to answer the question. Provide details and share your research!

But avoid


  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.

To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53279641%2fhow-can-csrf-been-exploited-if-the-content-type-is-not-plain-and-the-browser-as%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







這個網誌中的熱門文章

How to read a connectionString WITH PROVIDER in .NET Core?

In R, how to develop a multiplot heatmap.2 figure showing key labels successfully

Museum of Modern and Contemporary Art of Trento and Rovereto