From 795bd8c2e6c86096bae42eac577df5e707381aa1 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa Date: Mon, 29 May 2023 18:29:21 +0700 Subject: [PATCH] feat: added OSRF --- On Site Request Forgery.md | 81 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 81 insertions(+) create mode 100644 On Site Request Forgery.md diff --git a/On Site Request Forgery.md b/On Site Request Forgery.md new file mode 100644 index 0000000..640d786 --- /dev/null +++ b/On Site Request Forgery.md @@ -0,0 +1,81 @@ +# On-Site Request Forgery (OSRF) + +## Introduction +On-Site Request Forgery (OSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated. The difference between CSRF is a vulnerability where an attacker initiates requests from domain under their control to perform actions on behalf of victim. However, in OSRF, requests originate from vulnerable application itself and we control where our requests go. + +## Where to find +You can detect On-Site Request Forgery (OSRF) everywhere but there are 2 things that need to be looked up. +- Finding reflected input in `src` attribute. For example: + + ```html + +