#24496: Check CSRF Referer against CSRF_COOKIE_DOMAIN
------------------------------+--------------------------------------
     Reporter:  mattrobenolt  |                    Owner:  nobody
         Type:  New feature   |                   Status:  new
    Component:  CSRF          |                  Version:  master
     Severity:  Normal        |               Resolution:
     Keywords:  csrf          |             Triage Stage:  Unreviewed
    Has patch:  1             |      Needs documentation:  0
  Needs tests:  0             |  Patch needs improvement:  0
Easy pickings:  0             |                    UI/UX:  0
------------------------------+--------------------------------------

Comment (by carljm):

 Tim, the "we want to be more strict" is something Django already
 implements (checking `REFERER` against the request host on an HTTPS
 request). Matt's feature request is for that check to be against
 `CSRF_COOKIE_DOMAIN` rather than the request host, to allow for cross-
 subdomain requests. I think this is reasonable, and probably the way it
 should have worked from the beginning.

--
Ticket URL: <https://code.djangoproject.com/ticket/24496#comment:3>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to django-updates+unsubscr...@googlegroups.com.
To post to this group, send email to django-updates@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-updates/070.80331310a12588871604f3ab6ca9af44%40djangoproject.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to