Skip to content
This repository has been archived by the owner on Feb 12, 2022. It is now read-only.

Externally reported: csrf token on signups can be reused #114

Open
da3da1us opened this issue Sep 23, 2014 · 3 comments
Open

Externally reported: csrf token on signups can be reused #114

da3da1us opened this issue Sep 23, 2014 · 3 comments

Comments

@da3da1us
Copy link

CSRF token should be invalidated after it's been used. This is externally reported and the tester is already aggravated because they slipped through the cracks in bugcrowd's queue, so sticking with the 30 day timeline on this one would be really helpful.

@brandur
Copy link
Contributor

brandur commented Sep 23, 2014

CSRF token should be invalidated after it's been used.

Why? Even if the suggestion is designed to help mitigate the damage done by a leaked token, it seems somewhat arbitrary to recycle them on form submission. Also, keep in mind that a leaked token would be fairly difficult to make good on, because tokens are keyed to a particular open session.

@da3da1us
Copy link
Author

Do we have anything else in place to prevent someone from automating signup? I'm concerned about the abuse potential.

@brandur
Copy link
Contributor

brandur commented Sep 25, 2014

Do we have anything else in place to prevent someone from automating signup? I'm concerned about the abuse potential.

The short answer is "yes", but I don't want to go into detail on a public forum. I think if you can connect up with Rhys, he should be able to give you some good background on the subject.

But anyway, CSRF's aren't going to help with signup abuse unfortunately. Is there another reason that this proposed change is thought to be good practice?

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants