Exit hashes, how are they processed?

How is logout hashing typically handled in php?

on many sites, they usually exit the hashes to confirm that the user who logs out is the correct user, how is this usually handled?

Examples

http://domain.com/user/logout/nil4ytwojytjwoytjwy5tw5 

nil4ytwojytjwoytjwy5tw5 is a hash


Just updating my research so others can see how it works.

I realized that this type of attack is mainly used with xero-byte images and iframes per se.

if you are logged into SITE A and your browser site SITE B, the site for SITE B is, say, an image tag:

 <img src="http://SITE_A.com/logout/" width="1" height="1" style="display:none" /> 

and since the request does come from a legitimate registered user, the request is processed.

adding the validation value to important forms such as the transfer account, logout, etc., the hacker cannot get this value, and therefore the request will not be executed!

thanks for the help

+4
source share
1 answer

This is Stop CSRF . The value is a "csrf token", which is a cryptographic nonce (random number), which is stored as a session variable. It is checked that the request was executed from the same site and was not forged from the attacker's site.

+2
source

All Articles