#16010: Support Origin header checking in the CSRF middleware
-----------------------------+--------------------------------------
     Reporter:  davidben     |                    Owner:  Tim Graham
         Type:  New feature  |                   Status:  assigned
    Component:  CSRF         |                  Version:  master
     Severity:  Normal       |               Resolution:
     Keywords:               |             Triage Stage:  Accepted
    Has patch:  1            |      Needs documentation:  0
  Needs tests:  0            |  Patch needs improvement:  1
Easy pickings:  0            |                    UI/UX:  0
-----------------------------+--------------------------------------

Comment (by Adam Johnson):

 Ah yes - the scheme, and port (if non-default), are part of the Origin.
 Discarding them is not appropriate due to the security concern of leaking
 HTTPS data to an HTTP origin. I moved django-cors-headers to require
 schemes [https://github.com/adamchainz/django-cors-
 headers/blob/master/HISTORY.rst#300-2019-05-10 in version 3.0.0].

-- 
Ticket URL: <https://code.djangoproject.com/ticket/16010#comment:11>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to django-updates+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-updates/066.667df0fec9b636a60b6721fa3659af20%40djangoproject.com.

Reply via email to