Content Security Policy (CSP) Bypass
'unsafe-inline' --> Allows
'unsafe-eval'
Working payload:
Wildcard
Working payload: "/>'>
Lack of object-src and default-src
Working payloads:
">'>
File Upload + 'self'
If you can upload a JS file you can bypass this CSP:
Working payload: "/>'>
However, it's highly probable that the server is validating the uploaded file and will only allow you to upload determined type of files.
Moreover, even if you could upload a JS code inside a file using a extension accepted by the server (like: script.png) this won't be enough because some servers like apache server selects MIME type of the file based on the extension and browsers like Chrome will reject to execute Javascript code inside something that should be an image. "Hopefully", there are mistakes. For example, from a CTF I learnt that Apache doesn't know the .wave extension, therefore it doesn't serve it with a MIME type like audio/*.
From here, if you find a XSS and a file upload, and you manage to find a misinterpreted extension, you could try to upload a file with that extension and the Content of the script. Or, if the server is checking the correct format of the uploaded file, create a polyglot (some polyglot examples here).
Allowing third party endpoints
Arbitrary JS files loaded from whitelisted endpoints
Working payloads abusing cdnjs.cloudflare.com:
JSONP
In such scenarios where script-src is set to self and a particular domain which is whitelisted, it can be bypassed using jsonp. jsonp endpoints allow insecure callback methods which allow an attacker to perform xss.
Working payload: ">
The same vulnerability will occur if the trusted endpoint contains an Open Redirect, because if the initial endpoint is trusted, redirects are trusted.
Folder path bypass
If CSP policy points to a folder and you use %2f to encode "/", it is still considered to be inside the folder. All browsers seem to agree on that. This leads to a possible bypass, by using "%2f..%2f" if server decodes it. For example, if CSP allows http://example.com/company/
you can bypass the folder restriction and execute: http://example.com/company%2f..%2fattacker/file.js
Online Example: https://jsbin.com/werevijewa/edit?html,output
Through iframes
Working payloads:
AngularJS events
Depending on the specific policy, the CSP will block JavaScript events. However, AngularJS defines its own events that can be used instead. When inside an event, AngularJS defines a special $event
object, which simply references the browser event object. You can use this object to perform a CSP bypass. On Chrome, there is a special property on the $event/event
object called path
. This property contains an array of objects that causes the event to be executed. The last property is always the window
object, which we can use to perform a sandbox escape. By passing this array to the orderBy
filter, we can enumerate the array and use the last element (the window
object) to execute a global function, such as alert()
. The following code demonstrates this:
AngularJS and whitelisted domain
If the application is using angular JS and scripts are loaded from a whitelisted domain. It is possible to bypass this CSP policy by calling callback functions and vulnerable class. For more details visit this awesome git repo.
Working payloads:
Bypass CSP with dangling markup
Read how here.
'unsafe-inline'; img-src *; via XSS
'unsafe-inline'
means that you can execute any script inside the code (XSS can execute code) and img-src *
means that you can use in the webpage any image from any resource.
You can bypass this CSP exfiltrating the data via images (in this occasion the XSS abuses a CSRF where a page accessible by the bot contains a SQLi, and extract the flag via an image):
From: https://github.com/ka0labs/ctf-writeups/tree/master/2019/nn9ed/x-oracle
You could also abuse this configuration to load javascript code inserted inside an image. If for example, the page allows to load images from twitter. You could craft an special image, upload it to twitter and abuse the "unsafe-inline" to executea JS code (as a regular XSS) that will load the image, extract the JS from it and execute it: https://www.secjuice.com/hiding-javascript-in-png-csp-bypass/
img-src *; via XSS (iframe) - Time attack
Notice the lack of the directive 'unsafe-inline'
This time you can make the victim load a page in your control via XSS with a. This time you are going to make the victim access the page from where you want to extract information (
CSRF
). You cannot access the content of the page, but if somehow you can
control the time the page needs to load
you can extract the information you need.
This time a
flag
is going to be extracted, whenever a
char is correctly guessed
via SQLi the
response
takes
more time
due to the sleep function. Then, you will be able to extract the flag:
Policy Injection
Policy Injection
Research:
https://portswigger.net/research/bypassing-csp-with-policy-injection
Chrome
Chrome
If a
parameter
sent by you is being
pasted inside
the
declaration
of the
policy,
then you could
alter
the
policy
in some way that makes
it useless
. You could
allow script 'unsafe-inline'
with any of these bypasses:
Because this directive will
overwrite existing script-src directives
. You can find an example here:
http://portswigger-labs.net/edge_csp_injection_xndhfye721/?x=%3Bscript-src-elem+*&y=%3Cscript+src=%22http://subdomain1.portswigger-labs.net/xss/xss.js%22%3E%3C/script%3E
Edge
Edge
In Edge is much simpler. If you can add in the CSP just this:
;_
Edge would drop the entire policy. Example: http://portswigger-labs.net/edge_csp_injection_xndhfye721/?x=;_&y=%3Cscript%3Ealert(1)%3C/script%3E
Checking CSP Policies Online
Checking CSP Policies Online
Automatically creating CSP
Automatically creating CSP
https://csper.io/docs/generating-content-security-policy
References
References
最后更新于
这有帮助吗?