On 02/19/2010 06:43 AM, Florian Weimer wrote:
* Paul Davis:

Do you have any examples of how other sites have protected against
this? Unless I'm missing something I don't see how this is specific to
Futon so surely someone else has some explicit documentation on how to
avoid such things.

The standard countermeasure puts session identifiers into URLs
(sometimes they are called "form tokens", but this doesn't fit the
context here).

Upon login, the client could specify if it wants a session with or
without form tokens.

This:

http://www.cgisecurity.com/csrf-faq.html

is a pretty thorough resource.

One of the first discoveries of the vulnerability was in Zope back in 2000. AFAIK, the issue has still not been fixed there (although it has been in some CMSes built on top of Zope), which tells you something about Zope, but also about how exploitable this bug is:

You need to target a specific site that you know is running a particular back end, craft a POST url that will do something nasty, and then trick someone with admin privileges into clicking that link, while being logged in to the targeted site as admin.

I'm not saying it shouldn't be fixed, (with nonce tokens in any form that does something potentially dangerous, as Florian says) but it's not threat level 'change underwear'.

eric 'someday soon I'll write a whole mail without mentioning the good old days of Zope' casteleijn

Reply via email to