An Automated Detection System of Cross Site Request Forgery (CSRF) Vulnerability in Web Applications
An Automated Detection System of Cross Site Request Forgery (CSRF) Vulnerability in Web Applications
ISSN No:-2456-2165
Abstract:- In the modern era of technology, the usage of According to datareportal, the number of internet
web applications has become enormous. Web users are getting humongous day by day and by the end of
applications are now dealing with much more sensitive April 2021, the total number hits the milestone of 4.72
data. As web applications dealing with sensitive data, billion overall users and most of the internet users are
they are encountering lots of threats. Intruders are always using web applications.[https://datareportal.com/global-
trying to find new ways to penetrate these applications digital- overview]
and misuse them. The attackers use vulnerabilities to
perform those attacks. Cross site request forgery aka As the targeted user community is huge, and getting
CSRF is one of the vital threats and top ranked web larger day by day, web application security has become a
application vulnerability. CSRF attack is a type of attack major issue because it constantly dealing with sensitive
where end users are forced to perform unwanted actions information and personal data. Moreover, exploiting web
on a web application in which they are currently application vulnerability of web applications is increasing
authenticated. In some previous researches, several due to the system flaws.
numbers of case studies are found. In many researches,
different types of models are proposed and developed. To II. RELATED WORK
secure the web applications that are vulnerable to CSRF
vulnerability, many more studies need to be done in this Cross site request forgery is a client-side attack where
field. Therefore, there is not enough studies on users tricked into doing some actions or perform unwanted
automated system to detect this CSRF vulnerability. activities. There's a vulnerability called Cross-site scripting
Therefore, the key focus of this research is to develop an in the web application. The reason behind this vulnerability
automated web application vulnerability detection model is improper input validation. This vulnerability creates so
for detecting the CSRF vulnerability in web applications. many problems. These problems can be happened for both
My proposed solution is to do real time scan of CSRF server-side and client side of that web application with the
vulnerability in given URL. help of CSRF attacks. (Nadar, V. M. et al. 2018).
Keywords:- CSRF Vulnerability, Cyber Security, Automated V. M. Nadar et al. developed an enhanced detecting
detection Tool, Web Application Vulnerability. model that can detect cross-site request forgery attack,
Broken Authentication and Session Management attack
I. INTRODUCTION within the same simulation environment. Their work has
only checked for the malicious script (V. M. Nadar et al.
Cross site request forgery is a web application 2018).
vulnerability. If this vulnerability exists in any web
applications means that there is some weakness in system or The Open Web Application Security Project also
it is misconfigured. It allows an attacker to access sensitive known as OWASP has listed SQL injection, CSRF and XSS
data, modify data, perform state changing actions etc. To vulnerabilities as the most frequently exploited
make this attack possible, an attacker tricks the user and make vulnerabilities. An intruder or attacker fixes the target or
requests from users’ browser and to the applications where victim user and try to executes malicious JavaScript in the
the user is currently authenticated. Successful CSRF attack target's browser. By approaching an attack with this process,
can lead to serious security breaches for both the website as the attacker never directly targets his victim but he exploits
well as the end user. a vulnerability in a web application which the targeted victim
visits. The malicious script that an attacker wants to execute
is a key factor in these types of attack. If the attacker has
become successful and plants the malicious script
successfully and executed, the attacker might be able to
access sensitive information such as sessionID, cookies etc.
(Nagpal, Chauhan et al. 2017).