Create a gist now

Instantly share code, notes, and snippets.

Burp Session Handling Extension: CSRF tokens with random parameter names
from burp import (IBurpExtender, IBurpExtenderCallbacks, ISessionHandlingAction, IHttpListener)
import re
class BurpExtender(IBurpExtender, ISessionHandlingAction, IHttpListener):
def registerExtenderCallbacks(self, callbacks):
self.callbacks = callbacks
self.helpers = callbacks.getHelpers()
callbacks.setExtensionName("Handling of CSRF Tokens with Random Names")
self.out = callbacks.getStdout()
# CONFIG: find token in tools defined by this bitmask, constants defined in IBurpExtenderCallback
self.findTools = 0xffffffff
# CONFIG: this RE matches the CSRF token
self.reFindTokenName = re.compile("csrftokenname='(.*?)';")
self.reFindTokenValue = re.compile("csrftokenvalue='(.*?)';")
# CONFIG: Replacement RE must match complete token name, equal and token value
self.reReplaceToken = re.compile("&[0-9a-f]{8}=[0-9a-f]{8}")
self.token = None
def log(self, msg):
self.out.write(msg + "\n")
### IHttpListener ###
def processHttpMessage(self, tool, messageIsRequest, message):
if tool & self.findTools and not messageIsRequest:
response = self.helpers.bytesToString(message.getResponse())
matchName =
matchValue =
if matchName and matchValue:
newToken = + "=" +
if self.token != newToken:
self.token = newToken
self.log("New CSRF Token: " + self.token)
### ISessionHandlingAction ###
def getActionName(self):
return "Update CSRF Token with Random Name"
def performAction(self, currentRequest, macroItems):
request = self.helpers.bytesToString(currentRequest.getRequest())
# CONFIG: replacement must include possibly matched HTML syntax, e.g. parameter delimiters like & and ?
result = self.reReplaceToken.sub("&" + self.token, request)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment