gorilla/csrf CSRF vulnerability demo

What

This page demonstrates a CSRF vulnerability in the gorilla/csrf Go library. This vulnerability exists in all published versions of gorilla/csrf since its initial release.

NB: This vulnerability requires the ability for the attacker to set cookies that will be sent to the target origin. The demonstration attack achieves this by hosting the CSRF entrypoint on an origin that shares a common top level domain with the target.

How

gorilla/csrf does not validate the Origin header of incoming requests against an allowlist and instead performs CSRF validation by inspecting the Referer header. These Referer header checks only run when it believes the request is being served over TLS but due to a mishandling of the net/http.Request API these checks never run in production.

Specifically gorilla/csrf inspects the value of r.URL.Scheme to determine whether the request is being served over TLS

if r.URL.Scheme == "https" {
    // Fetch the Referer value. Call the error handler if it's empty or
    // otherwise fails to parse.
    referer, err := url.Parse(r.Referer())
    if err != nil || referer.String() == "" {
        r = envError(r, ErrNoReferer)
        cs.opts.ErrorHandler.ServeHTTP(w, r)
        return
    }
    ...

However, per the Go spec, this field is never populated for "server" requests.

// URL specifies either the URI being requested (for server
// requests) or the URL to access (for client requests).
//
// For server requests, the URL is parsed from the URI
// supplied on the Request-Line as stored in RequestURI.  For
// most requests, fields other than Path and RawQuery will be
// empty. (See [RFC 7230, Section 5.3](https://rfc-editor.org/rfc/rfc7230.html#section-5.3))
//
// For client requests, the URL's Host specifies the server to
// connect to, while the Request's Host field optionally
// specifies the Host header value to send in the HTTP
// request.
URL *[url](https://pkg.go.dev/net/url).[URL](https://pkg.go.dev/net/url#URL)

But what about the unit tests?

Unfortunately the net/httptest.NewRequest helper function that the gorilla/csrf test suite relies on contains a subtle bug whereby it will populate the r.URL.Scheme field on requests that it creates when passed a full URL string. This results in http.Request objects unlike any that will exist in production allowing unit tests to pass that would otherwise fail.

Here is a Go playground that demonstrates the httptest.NewRequest behavior in question.

CSRF attack and patch demonstration

This page scrapes target.csrf.patrickod.com for a valid CSRF token & cookie combination to use for its attack. It sets the exfiltrated CSRF cookie on the top level domain that it shares in common with the target origin but with a more specific path matching the target form.

We rely on the fact that many CSRF frameworks including gorilla/csrf set CSRF cookies with Path=/ so that they are sent accompanying forms submissions to all paths on the domain. Browsers send cookies ordered by most specific path first over domain so this malicious cookie will be sent in preference instead of any existing CSRF cookie set by the application.

Your attack values

CSRF Token: wbvkN9P1eLsCu50pl3QQ9VqbXtMWPNOheNIu/c/OwxL6Y7Xz6EO4fr3HFtFOh9u7U9TZvX0qXOefXJe1UXSUMw==
Cookie: MTc0MzYwODg1NXxJazg1YUZKNFJIVXlkMDFYTDJaSmRqUXlabEJNVkdkc1VHZ3lOWEpHYnpsSE5UUTJOVk5LTmpaV2VVVTlJZ289fABKSWQ_ehD2Uo7syuR7W9buRQn6rUN5i-3gys-115dL
Target:
target.csrf.patrickod.com
Description:
successful CSRF attack against vulnerable gorilla/csrf codebase
Target:
safe.csrf.patrickod.com
Description:
failed CSRF attack against patched gorilla/csrf codebase

Timeline

2024-12-15 initial disclosure to gorilla project maintainers
2025-01-06 patch submitted upstream
2025-04-03 you are here
??? patched gorilla/csrf version released

View the source

Source code for this site is available on Github.

Who

I'm Patrick O'Doherty, a Security Engineer living in San Francisco.

© 2025 — Patrick O'Doherty