Skip to content

Commit

Permalink
Clarify that only write requests are affected by CSRF protection
Browse files Browse the repository at this point in the history
  • Loading branch information
rnewson committed Aug 10, 2015
1 parent d5f3abb commit 18cc926
Showing 1 changed file with 3 additions and 2 deletions.
5 changes: 3 additions & 2 deletions src/config/http.rst
Original file line number Diff line number Diff line change
Expand Up @@ -540,8 +540,9 @@ Cross-site Request Forgery protection
reset form or cause damage by issuing a database delete request.

To prevent this, CouchDB can require a matching request header
before processing any request. The correct value of this header is
unknown to the attacker and so their attack fails.
before processing any write request (defined as any method other
than `GET`, `HEAD` or `OPTIONS`). The correct value of this header
is unknown to the attacker and so their attack fails.

To enable CSRF protection, add the custom request header
`X-CouchDB-CSRF` wih value `true` to any request. The response will
Expand Down

0 comments on commit 18cc926

Please sign in to comment.