Category:OWASP CSRFGuard Project
Just when developers are starting to run in circles over Cross Site Scripting, the 'sleeping giant' awakes for yet another web-catastrophe. Cross-Site Request Forgery (CSRF) is an attack whereby the victim is tricked into loading information from or submitting information to a web application for which they are currently authenticated. The problem is that the web application has no means of verifying the integrity of the request. The OWASP CSRFGuard Project attempts to address this issue through the use of unique request tokens.
Click here for more information regarding the design and implementation of CSRFGuard.
You can sign up for the OWASP CSRFGuard email list here https://lists.owasp.org/mailman/listinfo/owasp-csrfguard
You can access the SVN repository online at: http://owaspcsrfguard.googlecode.com
Click here to view the installation instructions of the OWASP CSRFGuard 1.0 series.
Click here to view the installation instructions of the OWASP CSRFGuard 2.0 series.
Click here to view the road map for the latest development version of CSRFGuard. Please feel free to add your own change requests or send me patches/diffs!
CSRF Testing Tool
Check out the OWASP CSRF Tester tool which allows you to test for CSRF vulnerabilities. This tool is also written in Java.
CSRF Prevention Cheat Sheet
Please see the OWASP CSRF Prevention Cheat Sheet for more information on prevention.
Feedback and Participation
We hope you find CSRFGuard useful. Please contribute back to the project by sending your comments, questions, and suggestions to OWASP. Thanks!
There are a small number of other projects that implement the unique random request token concept similar to that of CSRFGuard. They are as follows:
The Open Web Application Security Project is purely an open-source community driven effort. As such, all projects and research efforts are contributed and maintained with an individual's spare time. If you have found this or any other project useful, please support OWASP with a donation.