#25334: Check CSRF Referer against CSRF_TRUSTED_ORIGINS -----------------------------+---------------------- Reporter: joshkehn | Owner: joshkehn Type: New feature | Status: new Component: CSRF | Version: master Severity: Normal | Keywords: csrf Triage Stage: Unreviewed | Has patch: 1 Easy pickings: 0 | UI/UX: 0 -----------------------------+---------------------- See previous discussion in #24496
Right now, if you try to share a CSRF token across a subdomain without https, everything works great since the Referer header isn't validated. But over https, we want to be a bit more strict and make sure that the Referer is from another secure site, and also that the Referer matches where we think it should be coming from. Django should validate that the Referer header matches one of the domains listed in `CSRF_TRUSTED_ORIGINS`, including the currently responding `ALLOWED_HOST`. -- Ticket URL: <https://code.djangoproject.com/ticket/25334> Django <https://code.djangoproject.com/> The Web framework for perfectionists with deadlines. -- You received this message because you are subscribed to the Google Groups "Django updates" group. To unsubscribe from this group and stop receiving emails from it, send an email to django-updates+unsubscr...@googlegroups.com. To post to this group, send email to django-updates@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/django-updates/051.62dc6f2511541f057ce874d8d78f5cc2%40djangoproject.com. For more options, visit https://groups.google.com/d/optout.