test_csrf.php 2.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677
  1. <?php
  2. //define("NOLOGIN",1); // This means this output page does not require to be logged.
  3. //if (!defined('NOREQUIREUSER')) define('NOREQUIREUSER', '1');
  4. //if (!defined('NOREQUIREDB')) define('NOREQUIREDB', '1');
  5. if (!defined('NOREQUIRESOC')) {
  6. define('NOREQUIRESOC', '1');
  7. }
  8. //if (!defined('NOREQUIRETRAN')) define('NOREQUIRETRAN', '1');
  9. if (!defined('NOSTYLECHECK')) {
  10. define('NOSTYLECHECK', '1'); // Do not check style html tag into posted data
  11. }
  12. if (!defined('NOCSRFCHECK')) {
  13. define('NOCSRFCHECK', '1'); // Do not check anti CSRF attack test
  14. }
  15. if (!defined('NOTOKENRENEWAL')) {
  16. define('NOTOKENRENEWAL', '1'); // Do not check anti POST attack test
  17. }
  18. //if (!defined('NOREQUIREMENU')) define('NOREQUIREMENU', '1'); // If there is no need to load and show top and left menu
  19. //if (!defined('NOREQUIREHTML')) define('NOREQUIREHTML', '1'); // If we don't need to load the html.form.class.php
  20. //if (!defined('NOREQUIREAJAX')) define('NOREQUIREAJAX', '1'); // Do not load ajax.lib.php library
  21. if (!defined("NOLOGIN")) {
  22. define("NOLOGIN", '1'); // If this page is public (can be called outside logged session)
  23. }
  24. require '../../main.inc.php';
  25. // Security
  26. if ($dolibarr_main_prod) {
  27. accessforbidden();
  28. }
  29. /*
  30. * View
  31. */
  32. header("Content-type: text/html; charset=UTF8");
  33. // Security options
  34. header("X-Content-Type-Options: nosniff"); // With the nosniff option, if the server says the content is text/html, the browser will render it as text/html (note that most browsers now force this option to on)
  35. header("X-Frame-Options: SAMEORIGIN"); // Frames allowed only if on same domain (stop some XSS attacks)
  36. ?>
  37. This is a form to test if a CSRF exists into a Dolibarr page.<br>
  38. <br>
  39. - Change url to send request to into this file (URL to a hard coded page on a server B)<br>
  40. - Open this form into a virtual server A.<br>
  41. - Send the request to the virtual server B by clicking submit.<br>
  42. - Check that Anticsrf protection is triggered.<br>
  43. <br>
  44. <?php
  45. $urltosendrequest = "http://127.0.0.1/dolibarr/htdocs/user/group/card.php";
  46. print 'urltosendrequest = '.$urltosendrequest.'<br><br>';
  47. ?>
  48. Test post
  49. <form method="POST" action="<?php echo $urltosendrequest; ?>" target="_blank">
  50. <!-- <input type="hidden" name="token" value="123456789"> -->
  51. <input type="text" name="action" value="add">
  52. <input type="text" name="nom" value="New group test">
  53. <input type="submit" name="submit" value="Submit">
  54. </form>
  55. Test logout
  56. <html>
  57. <body>
  58. <script>history.pushState('', '', '/')</script>
  59. <form action="http://localhostgit/dolibarr_dev/htdocs/user/logout.php">
  60. <input type="submit" value="Submit request" />
  61. </form>
  62. <script>
  63. document.forms[0].submit();
  64. </script>
  65. </body>
  66. </html>