XSS - CSRF Prompt By-Pass


Cross-Site Request Forgery (CSRF/XSRF) is an attack that tricks the victim into loading a page that contains img links like the one below:

<img src="https://www.mybank.com/me?transferFunds=5000&to=123456"/>

When the victim's browser attempts to render this page, it will issue a request to www.mybank.com to the transferFunds.do page with the specified parameters. The browser will think the link is to get an image, even though it actually is a funds transfer function. The request will include any cookies associated with the site. Therefore, if the user has authenticated to the site, and has either a permanent cookie or even a current session cookie, the site will have no way to distinguish this from a legitimate user request. In this way, the attacker can make the victim perform actions that they didn't intend to, such as logout, purchase item, or any other function provided by the vulnerable website 

 perform Cross Site Request Forgery (CSRF) attacks containing multiple requests to by-pass a scriptable user-prompt 


1. Create new message with below script as message. 



id="myFrame" frameborder="1" marginwidth="0"

marginheight="0" width="800" scrolling=yes height="300"




id="frame2" frameborder="1" marginwidth="0"

marginheight="0" width="800" scrolling=yes height="300">


2. Start burp suite and open newly created message. 

3. Modify to add &transferFunds=50000 to request and forward the request. Click confirm

4. Transfer complete


Please publish modules in offcanvas position.