Click here to Skip to main content
15,879,474 members
Articles / Web Development / ASP.NET / ASP.NET Core

Preventing CSRF Attacks using ASP.NET Core, JavaScript and Angular

Rate me:
Please Sign up or sign in to vote.
5.00/5 (3 votes)
21 Mar 2021CPOL11 min read 13.7K   9   5
How to prevent Cross-Site Request Forgery attacks in ASP.NET Core, JavaScript and Angular
This article demonstrates Cross-Site Request Forgery attacks and how to prevent them in ASP.NET Core, JavaScript and Angular.

Table of Contents

Introduction

Cross-Site Request Forgery, also known as CSRF (pronounced as “See-Surf”), XSRF, One-Click Attack, and Session Riding, is a type of attacks where the attacker forces the user to execute unwanted actions in an application that the user is logged in. The attacker tricks the user into performing actions on their behalf. The impact of this attack depends on the level of permissions that the user has. For example, in a vulnerable bank website, the attacker could transfer an amount of money from the victim’s account or take ownership of the whole account.

About the Source Code

The source code for the samples of this article is available on GitHub at the following link:

You have five projects in the repository:

  • The attack sample projects, AttackSample.AttackerApp and AttackSample.VulnerableApp which show a valid CSRF attack to a vulnerable app.
  • The secure sample projects, SecureSample.SecureApp and SecureSample.AttackerApp which show a failed CSRF attack to a protected app.
  • The Angular project, SecureSample.AngularApp, which stands at its own.

CSRF Example

If we take the bank website example, the attacker may trick the user into loading some website or link that contains a script that makes a forged request to the bank website to transfer some funds. If the user is currently logged on to the bank website, and the website is vulnerable to such attacks, the attacker may succeed.

For example, if the bank website allows the following request for transfers:

GET http://vulnerable-bank.com/transfer?amount=1000&to=12345

The attacker could plug his bank account number into the “to” field and sends the user to a page that has a script that makes the above request or encourages him/her into clicking a certain link, for example:

HTML
<a href="http://vulnerable-bank.com/transfer?amount=1000&to=98765">Read More!</a>

Or embeds the request into a fake 0x0 image:

HTML
<img src="http://vulnerable-bank.com/transfer?amount=1000&to=98765" width="0" height="0" />

The attacker could include his code in a site that the user usually visits (e.g., putting a link into some download forums), or distribute his page with some help of social engineering such as sending a link via email or chat.

If the user is already logged on to the bank account, when he/she opens the page or clicks the fake link, the browser will automatically include target website cookies and other data and performs the forged request, results in a successful transfer request.

Image 1

Anatomy of an Attack

To summarize, a successful CSRF attack consists of:

  • A vulnerable website
  • A user who is currently logged on to that website
  • Session and other user cookies that the browser may include in requests
  • Easy-to-predict request parameter
  • User visits a harmful page or clicks on a fake link that executes a forged request to the vulnerable website

Protecting Your Web Application

To protect your web application against such attacks, always:

  • Use unpredictable parameters. Make it difficult for an attacker to simulate or construct a request to your application. An example of unpredictable parameters of the use of tokens, which are going to be explained soon.
  • Strictly validate in every case and in every step.

CSRF Attacks in Action

In our code sample, we have two AttackSample projects, one is for the vulnerable app, and the other is for the attacker app. In the vulnerable app, the user is authenticated, and a cookie is created to save user data:

C#
[HttpGet]
public bool IsAuthenticated()
{
  return Context.Request.Cookies["IsAuthenticated"] == "1";
}

[HttpPost]
public IActionResult Login()
{
  Context.Response.Cookies.Append("IsAuthenticated", "1");
  return RedirectToAction(nameof(Index), "Home");
}

[HttpPost]
public IActionResult Logout()
{
  Context.Response.Cookies.Delete("IsAuthenticated");
  return RedirectToAction(nameof(Index), "Home");
}

The application maintains a balance object and allows easy-to-predict requests for debit and credit operations:

C#
[HttpGet]
public int Balance()
{
  return CurrentBalance;
}

[HttpPost]
public int Debit(int amount)
{
  CurrentBalance -= amount;
  return Balance();
}

[HttpPost]
public int Credit(int amount)
{
  CurrentBalance += amount;
  return Balance();
}

On the other hand, the attacker tricks the user into executing the fake request by promising him with a gift when he clicks the link:

ASP.NET
<form method="post" action="http://localhost:62833/api/Debit">
  <input type="hidden" name="amount" value="50" />

  <button type="submit">Click here to win a free iPhone!</button>
</form>

The user is tricked into executing the fake request and resulting in a successful amount transfer.

Image 2

Anti-Forgery Tokens

The key to protecting your website against those kinds of attacks, is by using unpredictable request parameters. One of those unpredictable parameters is the anti-forgery tokens.

An anti-forgery token, also called CSRF token, is a unique, secret, unpredictable parameter generated by a server-side application for a subsequent HTTP request made by the client. When that request is made, the server validates this parameter against the expected value and rejects the request if the token is missing or invalid.

So, basically, the following request:

GET http://bank.com/transfer?amount=1000&to=12345

Will be extended with a third argument:

GET http://bank.com/transfer?amount=1000&to=12345&token=32465468465468465165484654768732467655465

That token is huge and impossible-to-guess. The server will include that token for the subsequent request only and will generate a new one each time a page/form is served.

Image 3

Technically speaking, the anti-forgery token is not an argument that is being sent in the query string. In fact, it is a cookie represented as hidden field that you generate inside your form. When the form is submitted, this value will be included along with the request as a header. The server code will check request and validate the value sent from client.

Anti-Forgery in ASP.NET Core

By default, the new ASP.NET Core Razor engine will include an anti-forgery token for the page forms, and all you need is to add the corresponding validation. Despite this, the next few sections will let you know how to generate the anti-forgery tokens in your app and how to validate them.

Token Generation: The Manual Way

There are two ways to generate and validate anti-forgery tokens, we will start by the manual, uncomfortable way. This can be done by using the IAntiForgery service.

ASP.NET
@inject Microsoft.AspNetCore.Antiforgery.IAntiforgery Csrf
@functions {
  public string GenerateCsrfToken()
  {
    return Csrf.GetAndStoreTokens(Context).RequestToken;
  }
}

<form method="post">
  <input type="hidden" id="RequestVerificationToken" 
   name="RequestVerificationToken" value="@GenerateCsrfToken()" />
</form>

The GetAndStoreTokens method generates a request token and stores the token in a response cookie. You get access to the generated token using the RequestToken property.

The generated hidden field will be like the following (the token has been abbreviated for clarity):

ASP.NET
<input type="hidden" id="RequestVerificationToken" 
name="RequestVerificationToken" value="CfDJ8El14QZHDe5Dtl0m3qOu6_PbEHcKAJ5ZjSRj6iF...">

Another, clearer way, for manually generating CSRF tokens is by using the MVC HTML helper:

ASP.NET
<form method="post">
  @Html.AntiForgeryToken()
</form>

You can check the generated cookie using Chrome DevTools:

Image 4

Token Generation: The Automatic Way

As we said earlier, the new ASP.NET Core Razor engine will always generate CSRF tokens for you, however, you still have the control over the token generation process.

You can customize the token generation process for Razor pages using the AddAntiforgery method which can be called in your Startup.ConfigureServices method.

C#
services.AddAntiforgery(options =>
{
  options.FormFieldName = "AntiForgeryFieldName";
  options.HeaderName = "AntiForgeryHeaderName";
  options.Cookie.Name = "AntiForgeryCookieName";
});

The previous code will generate a hidden field for the token with the specified name, and the token will be sent along with the request with the specified header name.

ASP.NET
<input name="AntiForgeryFieldName" type="hidden" value="CfDJ8N1DZWaKEuhDio...">

By default, the generated cookie name in ASP.NET core is “.AspNetCore.Antiforgery.<hash>”, the field name is “__RequestVerificationToken”, and the header name is “RequestVerificationToken”.

Token Validation

Now comes the next step, the token validation. Let us start in the normal, uncomfortable way. In your target action, you may use the following code for token validation:

C#
private Microsoft.AspNetCore.Antiforgery.IAntiforgery Csrf { get; set; }

public ApiController(Microsoft.AspNetCore.Antiforgery.IAntiforgery csrf)
{
  this.Csrf = csrf;
}

private async Task<bool> ValidateAntiForgeryToken()
{
  try
  {
    await Csrf.ValidateRequestAsync(this.HttpContext);
    return true;
  }
  catch (Microsoft.AspNetCore.Antiforgery.AntiforgeryValidationException)
  {
    return false;
  }
}

[HttpPost]
public async Task<ActionResult<int>> Debit(int amount)
{
  if (false == await ValidateAntiForgeryToken())
    return BadRequest();

  // action logic here
}

In the previous code, we started by defining our IAntiforgery service. This service allows you to validate a given request using the ValidateRequestAsync method which throws AntiforgeryValidationException exception when the token is invalid. We called this function the first thing in our Debit method and returned a 400 Bad Request response for invalid tokens.

Another, clearer way, to validate a CSRF token is by using the ValidateAntiForgeryToken attribute:

C#
[HttpPost]
[ValidateAntiForgeryToken]
public async Task<ActionResult<int>> Debit(int amount)

The above code will perform the same functionality as the manual IAntiforgery service code.

Now, when we run our application, we can see the difference. The app has been protected against CSRF attacks and the attacker cannot perform a request to your app.

Image 5

Worth mentioning that ValidateAntiForgeryToken can be applied to the controller class and will cause CSRF validation on all endpoints. We also have some alternatives to using ValidateAntiForgeryToken attribute:

  • AutoValidateAntiForgeryToken attribute: Will automatically validate endpoints for all HTTP methods except GET, HEAD, OPTIONS and TRACE.
  • IgnoreAntiforgeryToken attribute: Will ignore a method from validation if the parent class is decorated with ValidateantiForgeryToken or AutoValidateAntiForgeryToken.

Anti-Forgery in JavaScript

Let us take another example. Assume that you are accessing your API using JavaScript and you use the following code to call the credit method:

JavaScript
function request(url) {
  let url = location.origin + "/api/credit?amount=10";

  var request = {};
  request.url = url;
  request.type = 'POST';
  request.success = function (balance) {
    $('#balance')[0].innerText = balance;
  };
  request.error = function (xhr) {
    alert(`${xhr.status} ${xhr.statusText}`);
  };

  $.ajax(request);
}

When the anti-forgery validation is in action, you will receive a 400 bad request error, and this is expected because the ASP.NET Core engine cannot find the CSRF token header.

Image 6

For this to work, we must add our CSRF token manually to our request headers list. A small change in our code will do the trick:

JavaScript
function request(url) {
  let url = location.origin + "/api/debit?amount=10";

  var request = {};
  request.url = url;
  request.type = 'POST';
  request.headers = {
    'RequestVerificationToken': $('input[name="__RequestVerificationToken"]').val()
  };
  request.success = function (balance) {
    $('#balance')[0].innerText = balance;
  };
  request.error = function (xhr) {
    alert(`${xhr.status} ${xhr.statusText}`);
  };

  $.ajax(request);
}

As we said before, the default header name for CSRF tokens is “RequestVerificationToken”. If you, for any reason, changed the default header name:

C#
services.AddAntiforgery(options =>
{
  options.HeaderName = "AntiForgeryHeaderName";
});

Then you will have to change the value in your JavaScript code:

JavaScript
request.headers = {
  'AntiForgeryHeaderName': $('input[name="__RequestVerificationToken"]').val()
};

Anti-Forgery in Angular

Normally, when accessing a CSRF-protected endpoint from an Angular app, you will receive 400 bad request if you did not specify the CSRF header.

Image 7

To handle this, you must know the following:

  • Angular will recognize a CSRF token only if it is stored as a cookie under Angular’s dedicated name, which is “XSRF-TOKEN”.
  • Angular will always send the cookie token as a header under the dedicated name “X-XSRF-TOKEN”.
  • Your app must be able to generate the CSRF cookie under Angular’s dedicated name and to validate the CSRF header also under Angular’s dedicated name.

Let us see how we do this:

C#
public void Configure
(IApplicationBuilder app, IWebHostEnvironment env, IAntiforgery antiforgery)
{
  app.Use((context, next) =>
  {
    // return current accessed path
    string path = context.Request.Path.Value;

    if (path.IndexOf("/api/", StringComparison.OrdinalIgnoreCase) != -1)
    {
      var tokens = antiforgery.GetAndStoreTokens(context);
      context.Response.Cookies.Append("XSRF-TOKEN", tokens.RequestToken,
        new CookieOptions() { HttpOnly = false });
    }

    return next();
  });
}

The code is fairly easy, it does the following:

  • It starts by defining a middleware that will be executed for each request. This middleware will be responsible for generating the CSRF cookie with the dedicated name.
  • In this middleware, it checks the requested path. You do not need to generate the cookie for all requests, you need only for the API-targeted requests. Technical speaking, you need to generate this cookie for requests that targets our API controller, “/api/
  • Next, the code uses the IAntiforgery service to generate and store CSRF token in a cookie using the GetAndStoreTokens method. We used this mechanism before in the manual token generation section. Unless you change the default cookie name using AddForgery method (mentioned earlier), the default name for the generated token will start with “.AspNetCore.Antiforgery” as we said earlier.
  • Finally, the code reads the generated token and stores it in a cookie for the going request. It uses the dedicated Angular cookie name, “XSRF-TOKEN”.

The next step is to configure the generated the app to read the correct header. As we said earlier, we must preserve the default Angular CSRF header name, “X-XSRF-TOKEN”.

C#
services.AddAntiforgery(opts =>
{
  opts.HeaderName = "X-XSRF-TOKEN";

});

Now, run the app and see the charm. We are no longer receiving the 400 bad request error. And when investigating the request using Chrome DevTools or Fiddler, we can clearly see the generated cookie and header name.

Image 8

Angular Absolute Paths Issue

The above code will work like charm if the requested path is relative:

JavaScript
debit(amount: number): Observable<number> {
  // relative path
  let url = `/api/debit?amount=${amount}`;
  return this.request(url);
}

request(url: string): Observable<number> {
  let result: number;
  return this.http.post<number>(url, { });
}

However, when the requested path is absolute, even if it is same host, Angular is not smart enough to include the CSRF token in the request. You have to manually include it in your request. The following code, for example, will not work:

JavaScript
credit(amount: number): Observable<number> {
  // absolute path
  let url = this.baseUrl + `api/credit?amount=${amount}`;
  return this.request(url);
}

The solution to such case is to add the header manually to the request, or to use an HTTP interceptor to automatically add it to all requests. Let us see how to define our interceptor. We will start by the interceptor class itself.

JavaScript
import { Injectable } from "@angular/core";
import { HttpInterceptor, HttpXsrfTokenExtractor } from "@angular/common/http";
import { HttpEvent, HttpHandler, HttpRequest } from "@angular/common/http";
import { Observable } from "rxjs";

@Injectable()
export class XsrfInterceptor implements HttpInterceptor {
  constructor(private xsrfTokenExtractor: HttpXsrfTokenExtractor) {
  }

  intercept(req: HttpRequest<any>, next: HttpHandler): Observable<HttpEvent<any>> {
    // load token
    let xsrfToken = this.xsrfTokenExtractor.getToken();

    if (xsrfToken != null) {
      // create a copy of the request and
      // append the XSRF token to the headers list
      const authorizedRequest = req.clone({
        withCredentials: true,
        headers: req.headers.set('X-XSRF-TOKEN', xsrfToken)
      });

      return next.handle(authorizedRequest);
    } else {
      Return next.handle(req);
    }
  }
}

The above code simply extracts the token using the HttpXsrfTokenExtractor service which handles the token extraction from the cookie. It then copies the current request and appends the CSRF header using the dedicated name, “X-XSRF-TOKEN”. It finally, passes the request through the pipe to the next handler.

To be to use the HttpXsrfTokenExtractor service, you need to include its module in the app imports.

JavaScript
imports: [
  HttpClientModule,
],

Finally, you must include your interceptor in the injectable objects of the application.

JavaScript
providers: [
  { provide: HTTP_INTERCEPTORS, useClass: XsrfInterceptor, multi: true }
],

Now you can run the application and see how it operates smoothly for all requests.

Worth mentioning, that if your Angular app is contained inside a Razor CSHTML file, you can simply generate the CSRF token using the regular way:

ASP.NET
<div>
    <app-root></app-root>
    @Html.AntiForgeryToken()
</div>

And in the Angular code, you can use the jQuery-style to get the value of the token and include it in your request using code like this:

JavaScript
declare var $: any;

const httpOptions = {
    headers: new HttpHeaders({
      'X-XSRF-Token': $('input[name=__RequestVerificationToken]').val()
    })
  };
this.http.post(url, httpOptions);

Summary

By the end of this article, I think you have a full knowledge of how CSRF attacks work and how to protect your app from those attacks.

Again, the source code for the samples is available on GitHub at the following link:

You have five projects in the repository:

  • The attack sample projects, AttackSample.AttackerApp and AttackSample.VulnerableApp which show a valid CSRF attack to a vulnerable app.
  • The secure sample projects, SecureSample.SecureApp and SecureSample.AttackerApp which show a failed CSRF attack to a protected app.
  • The Angular project, SecureSample.AngularApp, which stands on its own.

History

  • 21st March, 2021: Initial version
This article was originally posted at https://justlikemagic.home.blog/2021/03/20/anti-forgery

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)


Written By
Technical Lead
Egypt Egypt
Mohammad Elsheimy is a developer, trainer, and technical writer currently hired by one of the leading fintech companies in Middle East, as a technical lead.

Mohammad is a MCP, MCTS, MCPD, MCSA, MCSE, and MCT expertized in Microsoft technologies, data management, analytics, Azure and DevOps solutions. He is also a Project Management Professional (PMP) and a Quranic Readings college (Al-Azhar) graduate specialized in Quranic readings, Islamic legislation, and the Arabic language.

Mohammad was born in Egypt. He loves his machine and his code more than anything else!

Currently, Mohammad runs two blogs: "Just Like [a] Magic" (http://JustLikeAMagic.com) and "مع الدوت نت" (http://WithdDotNet.net), both dedicated for programming and Microsoft technologies.

You can reach Mohammad at elsheimy[at]live[dot]com

Comments and Discussions

 
GeneralMy vote of 5 Pin
SEO Nedir26-Mar-21 22:26
professionalSEO Nedir26-Mar-21 22:26 
QuestionMicrosoft already had built-in solution for it Pin
Ravi Shankar K22-Mar-21 0:06
Ravi Shankar K22-Mar-21 0:06 
AnswerRe: Microsoft already had built-in solution for it Pin
Mohammad Elsheimy22-Mar-21 0:13
Mohammad Elsheimy22-Mar-21 0:13 
QuestionData outside the domain Pin
Mirzakhmet Syzdykov21-Mar-21 23:44
professionalMirzakhmet Syzdykov21-Mar-21 23:44 
AnswerRe: Data outside the domain Pin
Mohammad Elsheimy22-Mar-21 0:12
Mohammad Elsheimy22-Mar-21 0:12 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Praise Praise    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.