Re: Webobjects vulnerability to cross-site request forgery?
Re: Webobjects vulnerability to cross-site request forgery?
- Subject: Re: Webobjects vulnerability to cross-site request forgery?
- From: Daniele Corti <email@hidden>
- Date: Thu, 26 Jan 2012 17:16:09 +0100
Hi Giles,
Well, IMHO, only direct actions can be vulnerable to Cross-Site Attack.
To prevent this you can avoid to handle Session ID in Cookies and force urls to contains the Session ID in each request (BTW, this is the default WO behaviour). Second, you can check in Direct Actions that the http-referer domain is the same of your app (request().headerForKey("referer")).
For me, the best way to avoid Cross-Site Attack would be using session-less Direct Actions, with POST auth credential in each request. Under HTTPS of course...
Hope this help!
Bye
--
Daniele Corti
--
I DON'T DoubleClick
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Webobjects-dev mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden