On Mon, Dec 8, 2014 at 11:44 AM, Carl Meyer <[email protected]> wrote:
> Hi Larry,
>
> On 12/08/2014 07:14 AM, Larry Martell wrote:
>> On Sat, Dec 6, 2014 at 1:41 AM, James Schneider <[email protected]> 
>> wrote:
>>> Check out Collin's email from earlier, it has an example using curl but you
>>> should be able to adapt your web request with the cookie and POST values via
>>> the python script. The cookie and POST values for the CSRF token can be
>>> anything, they just need to match.
>>>
>>> https://groups.google.com/d/msgid/django-users/fb6e54a8-c9e7-45f7-882f-bc05c8ee90d2%40googlegroups.com?utm_medium=email&utm_source=footer
>>
>> Thanks. This is very simple. So simple I didn't even think of this.
>> But then can't anyone override the CSRF protection very easily?
>
> This is explained in the link to a previous thread that I posted above.
>
> The CSRF protection works because malicious JS can't control the value
> of the CSRF cookie submitted by your browser.

Right, but anyone can write a script to bypass the CSRF protection. I
was surprised that it would be so easy to do that. I guess that's not
what CSRF was designed to protect against.

-- 
You received this message because you are subscribed to the Google Groups 
"Django users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/django-users.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-users/CACwCsY6DRWCohZcPWcNP9%2B_0CCzk4J1EZi77POPo1ttwBYvd1w%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to