Security: add CSRF protection to login and setup forms#87
Open
vdaluz wants to merge 1 commit intosam1am:mainfrom
Open
Security: add CSRF protection to login and setup forms#87vdaluz wants to merge 1 commit intosam1am:mainfrom
vdaluz wants to merge 1 commit intosam1am:mainfrom
Conversation
Login and account creation forms had no CSRF tokens. A malicious page could submit these forms on behalf of an authenticated user. Uses itsdangerous URLSafeTimedSerializer (already a dependency) to generate signed, time-limited tokens embedded as hidden form fields. Tokens expire after 1 hour. Invalid or missing tokens return 403 with a fresh token so the user can retry immediately. Uses Starlette 1.0.0+ TemplateResponse API (request as first arg).
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Problem
The login and account setup forms have no CSRF tokens. A page on another origin could submit these forms on behalf of a visiting user (CSRF attack).
Fix
Uses
itsdangerous.URLSafeTimedSerializer— already a project dependency — to generate signed, time-limited tokens embedded as hidden form fields. Tokens are scoped with a separate salt (backlogia-csrf) from the session signer and expire after 1 hour.Invalid or missing tokens return 403 with a freshly generated token so the user can retry without reloading the page.
Changes
app_auth.py:_generate_csrf_token()and_validate_csrf_token()helpers; validation added toPOST /auth/loginandPOST /auth/setuplogin.html/setup.html: hiddencsrf_tokeninput added to both formsNote: uses Starlette 1.0.0+
TemplateResponseAPI (see PR #84).