|
3 | 3 |
|
4 | 4 | <overview> |
5 | 5 | <p>When you set up a web server to receive a request from a client without any mechanism |
6 | | -for verifying that it was intentionally sent, then it is vulnerable to attack. An attacker can |
7 | | -trick a client into making an unintended request to the web server that will be treated as |
8 | | -an authentic request. This can be done via a URL, image load, XMLHttpRequest, etc. and can |
9 | | -result in exposure of data or unintended code execution.</p> |
| 6 | +for verifying that it was intentionally sent, then it is vulnerable to a Cross Site Request |
| 7 | +Forgery (CSRF) attack. An attacker can trick a client into making an unintended request |
| 8 | +to the web server that will be treated as an authentic request. This can be done via a URL, |
| 9 | +image load, XMLHttpRequest, etc. and can result in exposure of data or unintended code execution.</p> |
10 | 10 | </overview> |
11 | 11 |
|
12 | 12 | <recommendation> |
13 | | -<p>Make sure any requests that change application state are protected from Cross Site Request Forgery (CSRF). |
14 | | -Some application frameworks provide default CSRF protection for unsafe HTTP request methods (such as |
15 | | -<code>POST</code>) which may change the state of the application. Safe HTTP request methods (such as |
16 | | -<code>GET</code>) should be read-only and should not be used for actions that change application state.</p> |
| 13 | +<p>Make sure any requests that change application state are protected from CSRF. Some application |
| 14 | +frameworks provide default CSRF protection for unsafe HTTP request methods (such as <code>POST</code>) |
| 15 | +which may change the state of the application. Safe HTTP request methods (such as <code>GET</code>) |
| 16 | +should only perform read-only operations and should not be used for actions that change application |
| 17 | +state.</p> |
17 | 18 |
|
18 | 19 | <p>This query currently supports the Spring and Stapler web frameworks. Spring provides default CSRF protection |
19 | 20 | for all unsafe HTTP methods. Stapler provides default CSRF protection for the <code>POST</code> method.</p> |
|
0 commit comments