Thanks,

I'll look into that and write my findings (if I succeed ;-) on the WIKI.

Martijn

On Mon, 2008-07-28 at 12:27 -0700, Howard Lewis Ship wrote:
> I wonder if this could be created as a Mixin?
> 
> Also, the internal LinkFactory service has listeners that know when an
> action link is created; it might be possible to automatically add a
> query parameter to every link with authentication, and then provided
> filters in the ComponentEventRequestHandler pipeline to enforce the
> check.
> 
> On Mon, Jul 28, 2008 at 12:24 PM, Martijn Brinkers (List)
> <[EMAIL PROTECTED]> wrote:
> > Hi Christian,
> >
> > Do you have some example code of you Form extension?
> >
> > Thanks,
> >
> > Martijn
> >
> > On Mon, 2008-07-28 at 15:18 -0400, Christian Edward Gruber wrote:
> >> A good way would be to alter the Form object to contain (via a hidden
> >> variable) a field that's generated per the whitepaper linked from that
> >> wikipedia article.  The form would then consume the post, and if that
> >> field is not in the expected state, generate an error state, which
> >> could then be redirected to a security page or some such.  We solved
> >> it this way, though without changing the T5 form object - we used a
> >> custom form object.
> >>
> >> A friend of mine wrote the linked whitepaper, so if someone's trying
> >> to put the fix into the Tapestry framework infrastructure, then let me
> >> know and I'll connect you by e-mail.  It's a good read anyway, as it's
> >> a bit of a subtle problem.
> >>
> >> Christian.
> >>
> >> On 28-Jul-08, at 14:50 , Martijn Brinkers (List) wrote:
> >>
> >> > Cross-site request forgeries (CSRF) is a web application vulnerability
> >> > that is often neglected by web developers. If your application is
> >> > vulnerable to CSRF and an attacker can entice you to request some URL
> >> > (this can be done for example with an image with the src set to some
> >> > Tapestry action) the attacker can execute random Tapestry actions and
> >> > post forms (like adding a adminitrator etc.) without the users
> >> > consent.
> >> > For more info on CSRF see for example:
> >> > http://en.wikipedia.org/wiki/Cross-site_request_forgery.
> >> > One way to protect against CSRF is to add a non-guessable code
> >> > (saved in
> >> > the user session) to the URLs that need to be protected against CSRF
> >> > or
> >> > add a hidden field to a Form with this unique code. When Tapestry
> >> > recieved a request (for a page or action) and that page/action need
> >> > protection a check is done to see if the code from the URL matches the
> >> > code stored in the user session. If not you know that the request did
> >> > not generated by tapestry.
> >> >
> >> > My question is what is the best way to implement this? Should I add
> >> > the
> >> > code as a context parameter and for forms as a hidden field? And use a
> >> > dispatcher to check whether the page should have been protected?
> >> >
> >> > Thanks,
> >> >
> >> > Martijn Brinkers
> >> >
> >> >
> >> > ---------------------------------------------------------------------
> >> > To unsubscribe, e-mail: [EMAIL PROTECTED]
> >> > For additional commands, e-mail: [EMAIL PROTECTED]
> >> >
> >>
> >>
> >> ---------------------------------------------------------------------
> >> To unsubscribe, e-mail: [EMAIL PROTECTED]
> >> For additional commands, e-mail: [EMAIL PROTECTED]
> >>
> >
> >
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: [EMAIL PROTECTED]
> > For additional commands, e-mail: [EMAIL PROTECTED]
> >
> >
> 
> 
> 


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to