SamuraiWTF / samuraiwtf

The main SamuraiWTF collaborative distro repo.

Home Page:https://owasp.org/www-project-samuraiwtf/#SamuraiWTF_Project

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

We need a trusted TLS connection with some targets

mgillam opened this issue · comments

commented

Due to the changes to browsers' (including Chromium and Firefox), CSRF and CORS misconfiguration exercises won't work correctly down the road if the vulnerable targets aren't served through TLS.

This relates to the sameSite cookie. The default behavior is switching from None to Lax, which means cookies will only be included first-party context, top-level nav, and other GET requests. This can still have some exploits (and would be worth having exercises for), but most of our examples would break. For now, we can set sameSite=None to revert them to classic behavior. However that's a very temporary fix, as the browsers are going to mandate the secure flag if you want them to respect sameSite=None. The correct solution is probably to generate a CA cert during installation, trust it, and use it to sign certs for the various Nginx reverse proxies.

image