#34182: Is there a reason only the headers are checked when using the csrf 
token?
----------------------------------+--------------------------------------
     Reporter:  Joon Hwan 김준환  |                    Owner:  nobody
         Type:  New feature       |                   Status:  closed
    Component:  CSRF              |                  Version:  dev
     Severity:  Normal            |               Resolution:  invalid
     Keywords:  csrf, cookie      |             Triage Stage:  Unreviewed
    Has patch:  0                 |      Needs documentation:  0
  Needs tests:  0                 |  Patch needs improvement:  0
Easy pickings:  0                 |                    UI/UX:  0
----------------------------------+--------------------------------------

Comment (by Joon Hwan 김준환):

 If there are tokens that attackers can't control, why do we need
 comparisons with tokens we can control?
 Aren't uncontrollable tokens enough?

-- 
Ticket URL: <https://code.djangoproject.com/ticket/34182#comment:2>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-updates/01070184aecdf772-3c6ead4a-e43d-4f31-801d-a4558ad1a048-000000%40eu-central-1.amazonses.com.

Reply via email to