You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/manual/src/docs/asciidoc/_includes/about/exploits/csrf.adoc
+1-1
Original file line number
Diff line number
Diff line change
@@ -349,7 +349,7 @@ One might ask why the expected CSRF token isn't stored in a cookie by default.
349
349
This is because there are known exploits in which headers (for example, to specify the cookies) can be set by another domain.
350
350
This is the same reason Ruby on Rails https://weblog.rubyonrails.org/2011/2/8/csrf-protection-bypass-in-ruby-on-rails/[no longer skips CSRF checks when the header X-Requested-With is present].
351
351
See http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2011-February/007533.html[this webappsec.org thread] for details on how to perform the exploit.
352
-
Another disadvantage is that by removing the state (that is, the timeout), you lose the ability to forcibly end the token if it is compromised.
352
+
Another disadvantage is that by removing the state (that is, the timeout), you lose the ability to forcibly invalidate the token if it is compromised.
353
353
354
354
// FIXME: Document timeout with lengthy form expire. We do not want to automatically replay that request because it can lead to exploit
0 commit comments