#34182: Is there a reason only the headers are checked when using the csrf
token?
----------------------------------+--------------------------------------
Reporter: Joon Hwan 김준환 | Owner: nobody
Type: New feature | Status: closed
Component: CSRF | Version: dev
Severity: Normal | Resolution: invalid
Keywords: csrf, cookie | Triage Stage: Unreviewed
Has patch: 0 | Needs documentation: 0
Needs tests: 0 | Patch needs improvement: 0
Easy pickings: 0 | UI/UX: 0
----------------------------------+--------------------------------------
Comment (by Joon Hwan 김준환):
If there are tokens that attackers can't control, why do we need
comparisons with tokens we can control?
Aren't uncontrollable tokens enough?
--
Ticket URL: <https://code.djangoproject.com/ticket/34182#comment:2>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.
--
You received this message because you are subscribed to the Google Groups
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/django-updates/01070184aecdf772-3c6ead4a-e43d-4f31-801d-a4558ad1a048-000000%40eu-central-1.amazonses.com.