You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For `/change_language/` the result is only a Location redirect (no session/cookie state), therefore there is no need for a CRSF token.
Fixinternetstandards#1581.
Signed-off-by: Benjamin W. Broersma <[email protected]>
This has me wondering what we use sessions for. Because if we use sessions, is there maybe something worth protecting with CSRF?
As we have no logins and no private data behind them, the only CSRF case I can think of is triggering someone's browser to run a test. Which the "attacker" already could anyways. We'd just attribute it to the wrong client - information which we barely process anyways.
A text search on session makes me think it's not in use. I would say let's remove it and check if the CI tests is still okay. Would be great if another dependency can be dropped.
The CSRF token is used:
Internet.nl/interface/templates/base.html
Line 59 in ca80957
However
"django.middleware.csrf.CsrfViewMiddleware"
is missing:Internet.nl/internetnl/settings.py
Lines 175 to 187 in ca80957
This is needed according to step 1 of the documentation.
However for
/change_language/
case, where the result is only a Location redirect, I don't see any CRSF possibility.The text was updated successfully, but these errors were encountered: