This repository was archived by the owner on Apr 4, 2025. It is now read-only.
CSRF validation missing - enhanced rule forked from main CodeQL queries #157
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Improvement from existing
cs/web/missing-token-validationrule.I also don't want to take the same shortcut checking that at least one other HttpPost is validated before flagging those that aren't, since that leads to loads of FNs.
I plan to make one version that is just an update of the original, adding AspNetCore, but this is an attempt to be much more thorough on spotting anti-CSRF devices.