You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
On the form for login, a token is placed. However it is possible to delete this token and send the request without it. This is theoretically a CSRF-Vulnerability, but it would allow the attacker to log a user on a specific account in. There are 2 Solutions for this: Simply remove the token or check it.
The text was updated successfully, but these errors were encountered:
Well, we should check it! The problem is that the login is performed by repoze.who.plugins.friendlyform, which is most likely the reason why this isn't implemented yet...
I just noticed that the same problem occurs with the OpenID form under /openid/init, more specific, that there isn't a token at all. I'm not sure if this is a security problem.
On the form for login, a token is placed. However it is possible to delete this token and send the request without it. This is theoretically a CSRF-Vulnerability, but it would allow the attacker to log a user on a specific account in. There are 2 Solutions for this: Simply remove the token or check it.
The text was updated successfully, but these errors were encountered: