admin管理员组文章数量:1335404
A nonce is supposed to first help me against CSRF and help against replay attacks is just a bonus if I "personalize" the nonce to something like pay-user-{id}
, but here's the problem - if my link looked like /wordpress/admin_ajax.php?action=pay-user&id=20&security=ej3548
I have 2 cases to take care of:
- I created a nonce without the specific user ID,
pay-user
- if an attacker obtains the nonce, he can make me click that link and pay any user. - I created a nonce with the specific user ID,
pay-user-{id}
- if an attacker obtains the nonce, he can only make me replay that request, since the nonce was made to verify that specific (to{id}
) action.
But that's still an issue in a lot of cases, paying someone is a prime example. I can't be made to pay someone else, but if I make that request 10 times, I'll pay that specific person 10 times.
Is there no specific "per request" hashing?
What to do?
本文标签: ajaxHow do I mitigate replay attacks when talking about actions that shouldn39t happen twice
版权声明:本文标题:ajax - How do I mitigate replay attacks when talking about actions that shouldn't happen twice? 内容由网友自发贡献,该文观点仅代表作者本人, 转载请联系作者并注明出处:http://www.betaflare.com/web/1742388489a2465516.html, 本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容,一经查实,本站将立刻删除。
发表评论