Home Backend Development PHP Tutorial How to troubleshoot cross-site request forgery errors in PHP?

How to troubleshoot cross-site request forgery errors in PHP?

Dec 17, 2023 am 08:38 AM
defensive measures php cross-site request forgery Troubleshoot errors

How to troubleshoot cross-site request forgery errors in PHP?

Cross-site request forgery (CSRF) attack is a common means of network attack, and it is no exception in applications in PHP. It uses the user's login status to carry out attacks, and disguises itself as a legitimate user to submit malicious requests by constructing forged requests, thereby causing harm. This article will introduce how to eliminate CSRF vulnerabilities in PHP applications, including specific code examples and detailed analysis.

  1. Add CSRF token

CSRF attacks bypass the website’s protection mechanism by forging requests. A common bypass method is the “password” attack. To prevent this attack, a CSRF token needs to be added to the website's forms.

Backend code:

<?php
if($_SERVER['REQUEST_METHOD'] == 'POST'){
    session_start();
    if($_POST['csrf_token'] == $_SESSION['csrf_token']){
        //请求数据合法,执行操作
    }else{
        //CSRF令牌不合法
    }
}
?>
Copy after login

Frontend code:

<form method="POST" action="submit.php">
    <input type="hidden" name="csrf_token" value="<?php echo $_SESSION['csrf_token']; ?>">
    <!-- 其他表单数据 -->
    <button type="submit">提交</button>
</form>
Copy after login
  1. Use a different CSRF token for each operation

For To further improve security, different CSRF tokens should be used for different operations.

Back-end code:

<?php
//生成新的CSRF令牌
function generate_csrf_token(){
    return md5(mt_rand(1, 1000000) . microtime());
}
//验证CSRF令牌
function validate_csrf_token($token){
    if(!isset($_SESSION['csrf_token']) || $_SESSION['csrf_token'] !== $token){
        die("CSRF Token验证失败");
    }
}
//生成CSRF令牌
if(!isset($_SESSION['csrf_token'])){
    //不存在令牌,生成新的令牌
    $_SESSION['csrf_token'] = generate_csrf_token();
}
//用户提交的数据需要先进行CSRF令牌验证
if($_SERVER['REQUEST_METHOD'] == 'POST'){
    validate_csrf_token($_POST['csrf_token']);
    //请求数据合法,执行操作
}
?>
Copy after login

Front-end code:

<form method="POST" action="submit.php">
    <input type="hidden" name="csrf_token" value="<?php echo generate_csrf_token(); ?>">
    <input type="hidden" name="action" value="delete">
    <input type="hidden" name="id" value="123">
    <button type="submit">删除用户</button>
</form>
Copy after login
  1. Bind IP address and user agent information

CSRF attack The purpose is to bypass the security verification of the website. The main preventive measure is to add a verification mechanism during the form submission process. To further enhance security, the CSRF token can be bound to the user.

Back-end code:

<?php
//生成新的CSRF令牌
function generate_csrf_token(){
    return md5(mt_rand(1, 1000000) . microtime());
}
//验证CSRF令牌
function validate_csrf_token($token){
    if(!isset($_SESSION['csrf_ips'][$_SERVER['REMOTE_ADDR']])
        || !in_array($_SERVER['HTTP_USER_AGENT'], $_SESSION['csrf_ips'][$_SERVER['REMOTE_ADDR']])){
        die("CSRF Token验证失败");
    }
    if(!isset($_SESSION['csrf_tokens'][$token])){
        die("CSRF Token验证失败");
    }else{
        unset($_SESSION['csrf_tokens'][$token]);
    }
}
//生成CSRF令牌
if(!isset($_SESSION['csrf_tokens'])){
    $_SESSION['csrf_tokens'] = [];
}
if(!isset($_SESSION['csrf_ips'])){
    $_SESSION['csrf_ips'] = [];
}
if(!isset($_SESSION['csrf_ips'][$_SERVER['REMOTE_ADDR']])){
    $_SESSION['csrf_ips'][$_SERVER['REMOTE_ADDR']] = [$_SERVER['HTTP_USER_AGENT']];
}else{
    $_SESSION['csrf_ips'][$_SERVER['REMOTE_ADDR']][] = $_SERVER['HTTP_USER_AGENT'];
    //限制用户代理
    if(count($_SESSION['csrf_ips'][$_SERVER['REMOTE_ADDR']]) > 3){
        array_shift($_SESSION['csrf_ips'][$_SERVER['REMOTE_ADDR']]);
    }
}
$new_token = generate_csrf_token();
$_SESSION['csrf_tokens'][$new_token] = true;
?>
Copy after login

Front-end code:

<form method="POST" action="submit.php">
    <input type="hidden" name="csrf_token" value="<?php echo $new_token; ?>">
    <input type="hidden" name="action" value="delete">
    <input type="hidden" name="id" value="123">
    <button type="submit">删除用户</button>
</form>
Copy after login

Through the above methods, CSRF vulnerabilities in PHP applications can be effectively eliminated. However, it should be noted that these methods are not absolutely reliable and need to be adjusted and improved based on the actual situation. At the same time, you need to avoid passing CSRF tokens into URLs or cookies to avoid introducing new security risks.

The above is the detailed content of How to troubleshoot cross-site request forgery errors in PHP?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Two Point Museum: All Exhibits And Where To Find Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Security Measures to Protect Ajax Applications from CSRF Attacks Security Measures to Protect Ajax Applications from CSRF Attacks Jan 30, 2024 am 08:38 AM

Ajax security analysis: How to prevent CSRF attacks? Introduction: With the development of Web applications and the widespread application of front-end technology, Ajax has become an indispensable part of developers' daily work. However, Ajax also brings some security risks to applications, the most common of which is CSRF attacks (Cross-SiteRequestForgery). This article will start with the principles of CSRF attacks, analyze its security threats to Ajax applications, and provide some defense C

Learn about security and defenses in JavaScript Learn about security and defenses in JavaScript Nov 03, 2023 am 10:36 AM

JavaScript is a scripting language widely used in web development, which can make web pages more interactive and dynamic. However, precisely because of its powerful functionality and flexibility, JavaScript also has some security risks. This article will introduce some security issues in JavaScript, as well as corresponding defensive measures, and provide some specific code examples to illustrate. Cross-site scripting attack (XSS) Cross-site scripting attack refers to malicious users inserting malicious scripts into web pages to obtain users' sensitive information or

How to deal with PHP security vulnerabilities and attack risks? How to deal with PHP security vulnerabilities and attack risks? Jun 29, 2023 pm 05:21 PM

How to deal with PHP security vulnerabilities and attack risks? With the development and popularization of the Internet, network security problems have become increasingly serious. As a widely used programming language, PHP also faces security vulnerabilities and attack risks. This article will introduce how to deal with PHP security vulnerabilities and attack risks to protect the security of websites and applications. Timely Updates to PHP Versions PHP developers regularly release updated versions that fix some known security vulnerabilities. Keeping your PHP version updated can ensure that your code uses the latest security patches. Certainly

How to troubleshoot cross-site request forgery errors in PHP? How to troubleshoot cross-site request forgery errors in PHP? Dec 17, 2023 am 08:38 AM

Cross-site request forgery (CSRF) attacks are a common means of network attacks, and applications in PHP are no exception. It uses the user's login status to carry out attacks, and disguises itself as a legitimate user to submit malicious requests by constructing forged requests, thereby causing harm. This article will introduce how to eliminate CSRF vulnerabilities in PHP applications, including specific code examples and detailed analysis. Adding a CSRF token CSRF attacks bypass the website's protection mechanism by forging requests. A common bypass method is the "password" attack. To prevent this attack

Cloud security technology development trends and defensive measures Cloud security technology development trends and defensive measures Jun 11, 2023 am 11:52 AM

With the rapid development and popularity of cloud computing, cloud security issues have also received increasing attention. With the extensive use of technologies such as cloud computing and big data storage and processing in recent years, security issues such as data leakage, network attacks, and malware have spread, and cloud security issues have become increasingly severe. To this end, cloud security technology is constantly updated and developed, and enterprises need to strengthen cloud security defense measures to ensure information security. 1. Development trends of cloud security technology 1. Multi-dimensional security protection With the development of artificial intelligence and Internet of Things technology, cloud security technology application scenarios have become more complex, and security

How to avoid file inclusion vulnerability security issues in PHP language development? How to avoid file inclusion vulnerability security issues in PHP language development? Jun 11, 2023 am 10:25 AM

PHP language has always been a popular web development language. It has simple and easy-to-read syntax, powerful functions and a huge ecosystem. In a large number of web applications, the PHP language plays an important role. However, when used inappropriately, it can become a vulnerable vulnerability, and file inclusion vulnerability is one of them. In this article, we will introduce the definition of file inclusion vulnerabilities and discuss how to avoid the security issues of file inclusion vulnerabilities as much as possible. What is a file inclusion vulnerability? A file inclusion vulnerability refers to the inclusion of files through dynamic references.

How to avoid SQL injection attacks in PHP files? How to avoid SQL injection attacks in PHP files? May 22, 2023 am 08:42 AM

With the continuous development of Internet technology, the security issues of websites and applications have attracted more and more attention. Among them, SQL injection attack is a common attack method, especially for websites and applications written in PHP. Therefore, this article will introduce how to avoid SQL injection attacks in PHP files to ensure the security of websites and applications. Using prepared statements Prepared statements are an important way to prevent SQL injection attacks. It can separate SQL statements and parameters, thereby avoiding improper input caused by

How to deal with web attacks? How to deal with web attacks? Jun 11, 2023 pm 05:13 PM

Web attacks refer to a type of attack that exploits vulnerabilities in web applications to carry out malicious activities. This form of attack is becoming increasingly common, causing huge losses to enterprises, governments and individuals. How to deal with Web attacks has become an urgent problem in the field of network security. 1. Common types of web attacks 1. SQL injection attack: The attacker injects malicious code into the input box and uses the system to perform malicious operations on the query results of the database. 2. Cross-site scripting attack (XSS): The attacker injects JavaScript

See all articles