-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enforce CORS (was: Security section) #8
Comments
Web applications that don't send additional data (e.g. so called "CSRF tokens") in the request's HTTP headers, or looking at If new formats, such as |
👍 to what @rodneyrehm says. I came across this proposal shortly after adopting content-type based filtering of exactly the sort he describes in a project of mine, and I had the same concerns. |
+1 - preflight it. The prior art is XHR. |
Another problem that I pointed out at the list right now:
creates a huge response. Combined with CSRF that would mean DDoS with minimal scripting afford. |
Issue #11, which proposes the use of a new content type Preflight request for any cross-origin form submission would be inconsistent with the behaviour of forms using any other |
@thoger I don't think that using a new media type actually gives us any serious security. All it takes is a service that doesn't check the media type it gets, or that happily accepts any Behaving differently from other enctypes in this respect isn't a problem. It doesn't cause compatibility issues. |
I was pointing out that there are applications used today that do content-type check as CSRF protection. Bugzilla jsonrpc can probably serve as a decent non-niche example: I'm not talking about services that perform no check and are already vulnerable to CSRF, only about those that will get broken by this change. |
I think this weights more than poorly designed CSRF protection based on content type or no CSRF protection at all of available services today. Personally, I would not even vote for that |
Out of interest did this proposal die @darobin?
|
This idea didn't have a comfy home, my idea has been to send it to the WICG. And yes, preflighting is likely a good idea. |
|
Is it worth including a security section? This opens up the possibility of attacking a JSON service with CSRF. If you rely on the likes of cookies for your service without any CSRF protection you likely deserve whatever's coming your way, but it's still a new attack.
The text was updated successfully, but these errors were encountered: