Fixing CSRF exploits in Infrastructure

Till Maas opensource at till.name
Tue Nov 25 18:04:14 UTC 2008


On Mon November 24 2008, Toshio Kuratomi wrote:

> I've been researching the CSRF exploit and how it affects our web apps
> recently.  The short story is that our code is pretty open to this at
> the moment.  I've written up a proposal for fixing this but it will
> require a lot of coding so I'd love to have some more eyes on it to make
> sure I'm not making any stupid mistakes.
>
> The proposal is here::
>   https://fedorahosted.org/fas/wiki/CSRF

From the proposal:
| make a GET request that can change state on the server

It is recommended to not use GET requests to change state on the server, 
therefore it would be probably better to change these GET requests to POST 
requests.

Regards,
Till
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 827 bytes
Desc: This is a digitally signed message part.
Url : http://lists.fedoraproject.org/pipermail/infrastructure/attachments/20081125/1f875834/attachment.bin 


More information about the infrastructure mailing list