SamuraiWTF / samuraiwtf

The main SamuraiWTF collaborative distro repo.
https://owasp.org/www-project-samuraiwtf/#SamuraiWTF_Project
GNU Lesser General Public License v3.0
453 stars 117 forks source link

We need a trusted TLS connection with some targets #134

Closed mgillam closed 2 years ago

mgillam commented 4 years ago

Due to the changes to browsers' (including Chromium and Firefox), CSRF and CORS misconfiguration exercises won't work correctly down the road if the vulnerable targets aren't served through TLS.

This relates to the sameSite cookie. The default behavior is switching from None to Lax, which means cookies will only be included first-party context, top-level nav, and other GET requests. This can still have some exploits (and would be worth having exercises for), but most of our examples would break. For now, we can set sameSite=None to revert them to classic behavior. However that's a very temporary fix, as the browsers are going to mandate the secure flag if you want them to respect sameSite=None. The correct solution is probably to generate a CA cert during installation, trust it, and use it to sign certs for the various Nginx reverse proxies.

image