Difference between revisions of "Category:OWASP CSRFGuard Project"

From OWASP
Jump to: navigation, search
(Downloads)
 
(18 intermediate revisions by 2 users not shown)
Line 1: Line 1:
<!---==== Main ====--->
+
=Main=
== Overview ==
+
  
Welcome to the home of the OWASP CSRFGuard Project! OWASP CSRFGuard is a library that implements a variant of the [http://www.corej2eepatterns.com/Design/PresoDesign.htm synchronizer token pattern] to mitigate the risk of [[Cross-Site Request Forgery]] (CSRF) attacks. The OWASP CSRFGuard library is integrated through the use of a JavaEE Filter and exposes various automated and manual ways to integrate per-session or pseudo-per-request tokens into HTML. When a user interacts with this HTML, CSRF prevention tokens (i.e. cryptographically random synchronizer tokens) are submitted with the corresponding HTTP request. It is the responsibility of OWASP CSRFGuard to ensure the token is present and is valid for the current HTTP request. Any attempt to submit a request to a protected resource without the correct corresponding token is viewed as a CSRF attack in progress and is discarded. Prior to discarding the request, CSRFGuard can be configured to take one or more actions such as logging aspects of the request and redirecting the user to a landing page. The latest release enhances this strategy to support the optional verification of HTTP requests submitted using Ajax as well as the optional verification of referrer headers.
+
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
  
== Project Lead ==
+
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 +
| valign="top"  style="border-right: 1px dotted gray;padding-right:25px;" |
  
[mailto:eric@infraredsecurity.com Eric Sheridan] is the lead and primary developer of the OWASP CSRFGuard project and a Managing Partner at [http://www.infraredsecurity.com Infrared Security]. Aside from leading up CSRFGuard, Eric has contributed to or provided guidance on numerous other OWASP projects including CSRF Prevention Cheat Sheet, WebGoat, Stinger, CSRFTester, and Enterprise Security API (ESAPI). As Managing Partner at Infrared Security, Eric Sheridan specializes in a wide variety of application security activities including static analysis, penetration tests, code reviews, and threat modeling. In his personal time... wait, what is that?
+
==OWASP CSRFGuard ==
  
== License ==
+
Welcome to the home of the OWASP CSRFGuard Project! OWASP CSRFGuard is a library that implements a variant of the [http://www.corej2eepatterns.com/Design/PresoDesign.htm synchronizer token pattern] to mitigate the risk of [[Cross-Site Request Forgery]] (CSRF) attacks.
  
OWASP CSRFGuard is offered under the [http://www.opensource.org/licenses/bsd-license.php BSD] license. For further information on OWASP licenses, please consult the [[OWASP Licenses]] page.
+
==Introduction==
  
== Email List ==
+
The OWASP CSRFGuard library is integrated through the use of a JavaEE Filter and exposes various automated and manual ways to integrate per-session or pseudo-per-request tokens into HTML.
  
You can sign up for the OWASP CSRFGuard email list at [https://lists.owasp.org/mailman/listinfo/owasp-csrfguard https://lists.owasp.org/mailman/listinfo/owasp-csrfguard]
+
==Description==
  
== Source Code ==
+
When a user interacts with this HTML, CSRF prevention tokens (i.e. cryptographically random synchronizer tokens) are submitted with the corresponding HTTP request.
 +
It is the responsibility of OWASP CSRFGuard to ensure the token is present and is valid for the current HTTP request. Any attempt to submit a request to a protected resource without the correct corresponding token is viewed as a CSRF attack in progress and is discarded.
 +
Prior to discarding the request, CSRFGuard can be configured to take one or more actions such as logging aspects of the request and redirecting the user to a landing page.
 +
The latest release enhances this strategy to support the optional verification of HTTP requests submitted using Ajax as well as the optional verification of referrer headers.
  
You can access the Git repository online at https://github.com/esheri3/OWASP-CSRFGuard
+
[[File:CSRGuard.PNG|300px|thumb|left|CSRFGuard Architecture]]
  
== Downloads ==
+
== What is CSRFGuard? ==
  
Download and build the latest source code from GitHub - https://github.com/esheri3/OWASP-CSRFGuard
+
OWASP CSRFGuard provides:
  
[[CSRFGuard_Deprecated_Releases | Deprecated Releases]] - article containing several download references to deprecated and officially unsupported releases
+
* A library that implements a variant of the synchronizer token pattern to mitigate the risk of Cross-Site Request Forgery (CSRF) attacks.
 +
* A JavaEE Filter and exposes various automated and manual ways to integrate per-session or pseudo-per-request tokens into HTML.
  
== User Manual(s) ==
+
==Licensing==
 +
The CSRFGuard project is run by Azzeddine RAMRAMI. He can be contacted at azzeddine.ramrami AT owasp.org. CSRFGuard distributions are currently maintained on GitHub.
  
[[CSRFGuard_3_User_Manual | OWASP CSRFGuard v3 ]] - series of articles describing the installation, configuration, and deployment of OWASP CSRFGuard v3.
 
  
== References ==
+
| valign="top"  style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
 +
 
 +
== Presentation ==
 +
 
 +
Link to presentation
 +
 
 +
== Project Leader ==
 +
 
 +
The CSRFGuard project is run by Azzeddine RAMRAMI. He can be contacted at azzeddine.ramrami AT owasp.org.
 +
 
 +
== Related Projects ==
  
 
:*[http://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project OWASP CSRFTester ] - utility to assist in the testing and generating PoC for CSRF attacks.
 
:*[http://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project OWASP CSRFTester ] - utility to assist in the testing and generating PoC for CSRF attacks.
Line 38: Line 52:
 
:*http://www.owasp.org/index.php/.Net_CSRF_Guard - project implementing CSRFGuard style solution for ASP.NET.
 
:*http://www.owasp.org/index.php/.Net_CSRF_Guard - project implementing CSRFGuard style solution for ASP.NET.
  
== Project Sponsors ==
+
| valign="top"  style="padding-left:25px;width:200px;" |
  
[[File:Infrared-logo-small.png | link=http://www.infraredsecurity.com]]
+
== Quick Download ==
  
<!---==== Project About ====
+
Download and build the latest source code from GitHub :
{{:Projects/OWASP CSRFGuard Project| Project About}}
+
 
 +
* https://github.com/aramrami/OWASP-CSRFGuard
 +
 
 +
Download and build the latest source code from GitHub - https://github.com/aramrami/OWASP-CSRFGuard
 +
 
 +
[[CSRFGuard_Deprecated_Releases | Deprecated Releases]] - article containing several download references to deprecated and officially unsupported releases
 +
 
 +
== User Manual(s) ==
 +
 
 +
[[CSRFGuard_3_User_Manual | OWASP CSRFGuard v3 ]] - series of articles describing the installation, configuration, and deployment of OWASP CSRFGuard v3.
 +
== News and Events ==
 +
 
 +
* [08 Fev 2014] A security fix has been published. See details on GitHub
 +
* [10 Feb 2014] Release 3.1 of CSRFGuard project is now available for download
 +
 
 +
 
 +
== In Print ==
 +
 
 +
This project can be purchased as a print on demand book from Lulu.com
 +
 
 +
==Classifications==
 +
 
 +
  {| width="200" cellpadding="2"
 +
  |-
 +
  | colspan="2" align="center"  | [[File:Project_Type_Files_CODE.jpg|link=]]
 +
  |}
 +
 
 +
|}
 +
 
 +
=FAQs=
 +
 
 +
Here a complete CSRF attacks FAQ:
 +
 
 +
* http://www.cgisecurity.com/csrf-faq.html
 +
 
 +
= Acknowledgements =
 +
==Volunteers==
 +
 
 +
CSRFGuard is developed by a worldwide team of volunteers. The primary contributors to date have been:
 +
 
 +
* Ahamed Nafeez, Security Engineer.
 +
* Christa Erwin, Security, Programmer/Analyst.
 +
 
 +
==Others==
 +
 
 +
* Eric Sheridan was the original designer of CSRFGuard until 3.0 version.
 +
 
 +
= Road Map and Getting Involved =
 +
 
 +
As of CSRFGuard the priorities are:
 +
* Address any security vulnerabilities around javascript prototype hijacking
 +
* Support for Internet Explorer
 +
* Addressing outstanding issues listed in GitHub
 +
* Support for Multi-part requests
 +
* Add support for the 'Origin' header
 +
 
 +
Involvement in the development and promotion of CSRFGurd is actively encouraged!
 +
You do not have to be a security expert in order to contribute.
 +
Some of the ways you can help:
 +
* Make fix to the actual version
 +
* Propose a security enhcement
 +
* Write a complete Architecture Folder for CSRFGurd
 +
* Add an IA engine to detect unknown attacks.
 +
 
 +
 
 +
 
 +
=Contact US=
 +
You can sign up for the OWASP CSRFGuard email list at [https://lists.owasp.org/mailman/listinfo/owasp-csrfguard https://lists.owasp.org/mailman/listinfo/owasp-csrfguard]
  
__NOTOC__ <headertabs />---->
+
__NOTOC__ <headertabs />  
  
[[Category:OWASP_Validation_Project]]
+
[[Category:OWASP Project]]
[[Category:Java]]
+
[[Category:OWASP_Project|CSRFGuard Project]]
+
[[Category:OWASP_Java_Project]]
+

Latest revision as of 01:21, 24 February 2014

[edit]

OWASP Project Header.jpg

OWASP CSRFGuard

Welcome to the home of the OWASP CSRFGuard Project! OWASP CSRFGuard is a library that implements a variant of the synchronizer token pattern to mitigate the risk of Cross-Site Request Forgery (CSRF) attacks.

Introduction

The OWASP CSRFGuard library is integrated through the use of a JavaEE Filter and exposes various automated and manual ways to integrate per-session or pseudo-per-request tokens into HTML.

Description

When a user interacts with this HTML, CSRF prevention tokens (i.e. cryptographically random synchronizer tokens) are submitted with the corresponding HTTP request. It is the responsibility of OWASP CSRFGuard to ensure the token is present and is valid for the current HTTP request. Any attempt to submit a request to a protected resource without the correct corresponding token is viewed as a CSRF attack in progress and is discarded. Prior to discarding the request, CSRFGuard can be configured to take one or more actions such as logging aspects of the request and redirecting the user to a landing page. The latest release enhances this strategy to support the optional verification of HTTP requests submitted using Ajax as well as the optional verification of referrer headers.

CSRFGuard Architecture

What is CSRFGuard?

OWASP CSRFGuard provides:

  • A library that implements a variant of the synchronizer token pattern to mitigate the risk of Cross-Site Request Forgery (CSRF) attacks.
  • A JavaEE Filter and exposes various automated and manual ways to integrate per-session or pseudo-per-request tokens into HTML.

Licensing

The CSRFGuard project is run by Azzeddine RAMRAMI. He can be contacted at azzeddine.ramrami AT owasp.org. CSRFGuard distributions are currently maintained on GitHub.


Presentation

Link to presentation

Project Leader

The CSRFGuard project is run by Azzeddine RAMRAMI. He can be contacted at azzeddine.ramrami AT owasp.org.

Related Projects

Quick Download

Download and build the latest source code from GitHub :

Download and build the latest source code from GitHub - https://github.com/aramrami/OWASP-CSRFGuard

Deprecated Releases - article containing several download references to deprecated and officially unsupported releases

User Manual(s)

OWASP CSRFGuard v3 - series of articles describing the installation, configuration, and deployment of OWASP CSRFGuard v3.

News and Events

  • [08 Fev 2014] A security fix has been published. See details on GitHub
  • [10 Feb 2014] Release 3.1 of CSRFGuard project is now available for download


In Print

This project can be purchased as a print on demand book from Lulu.com

Classifications

Project Type Files CODE.jpg

Here a complete CSRF attacks FAQ:

Volunteers

CSRFGuard is developed by a worldwide team of volunteers. The primary contributors to date have been:

  • Ahamed Nafeez, Security Engineer.
  • Christa Erwin, Security, Programmer/Analyst.

Others

  • Eric Sheridan was the original designer of CSRFGuard until 3.0 version.

As of CSRFGuard the priorities are:

  • Address any security vulnerabilities around javascript prototype hijacking
  • Support for Internet Explorer
  • Addressing outstanding issues listed in GitHub
  • Support for Multi-part requests
  • Add support for the 'Origin' header

Involvement in the development and promotion of CSRFGurd is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:

  • Make fix to the actual version
  • Propose a security enhcement
  • Write a complete Architecture Folder for CSRFGurd
  • Add an IA engine to detect unknown attacks.


You can sign up for the OWASP CSRFGuard email list at https://lists.owasp.org/mailman/listinfo/owasp-csrfguard

Pages in category "OWASP CSRFGuard Project"

The following 4 pages are in this category, out of 4 total.