Fixing CSRF exploits in Infrastructure
opensource at till.name
Tue Nov 25 18:04:14 UTC 2008
On Mon November 24 2008, Toshio Kuratomi wrote:
> I've been researching the CSRF exploit and how it affects our web apps
> recently. The short story is that our code is pretty open to this at
> the moment. I've written up a proposal for fixing this but it will
> require a lot of coding so I'd love to have some more eyes on it to make
> sure I'm not making any stupid mistakes.
> The proposal is here::
From the proposal:
| make a GET request that can change state on the server
It is recommended to not use GET requests to change state on the server,
therefore it would be probably better to change these GET requests to POST
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 827 bytes
Desc: This is a digitally signed message part.
Url : http://lists.fedoraproject.org/pipermail/infrastructure/attachments/20081125/1f875834/attachment.bin
More information about the infrastructure