yes, Sebastian, wicket resolved data tampering because it stores in session form data. I commented "data tampering" too to refer to security features that could be provided by frameworks, like HDIV does...
;-) Arthur. 2008/3/4, Sebastiaan van Erk <[EMAIL PROTECTED]>: > > Hi, > > The tampering with data part is resolved by Wicket, since Wicket does > not use hidden fields but stores the data in the session on the server > side. > > Furthermore, Wicket by default does server side validation of all input, > even if you add ajaxy behaviors to also do client side validation. > > Regards, > Sebastiaan > > Arthur Ahiceh wrote: > >>> I believe that answers the original question, that CSRF protection is > > *NOT* a security feature offered by Wicket. > > > > I think the same, I said it and they tell me that URLs wasn't > predictables > > when the page identifiers are a correlative numbers, so vulnerable to > CSRF > > attacks. > > > > I want to emphasize that I think that these tasks (avoid CSRF attacks, > to > > offer confidentiality, avoid tampering data in forms) would must be > resolved > > by default by frameworks like Wicket to offer "a security framework". > > > > Arthur. > > > > > > > > > > > > > > > > 2008/3/4, Sebastiaan van Erk <[EMAIL PROTECTED]>: > >> Wicket does nothing to protect from CSRF attacks, and it is trivially > >> vulnerable. Sure it's a lot more difficult with the standard > >> ?wicket:interface type URLs than it would be with more predictable > URLs, > >> but you can still quite easily guess the URLs, and futhermore, to > >> improve your chances of success you can simply include many images in > >> the attacking page with different values for the URLs, i.e., > >> > >> img > >> src=" > >> > http://thesiteiwannahack.com/?wicket:interface=:11:formToHack::IFormSubmitListener::&myparam1=val1 > >> " > >> > >> and then for page id 11, 12, 13, 14, for 1 to 100 for all I care, all > in > >> one page. > >> > >> Furthermore, most people actually LIKE predictable urls and go to great > >> length to mount pages and make them bookmarkable. There's even a > >> StatelessForm component, which is entirely vulnerable to CSRF. > >> > >> Thus, I'd say that even without a quickstart, it's obvious that Wicket > >> does not offer any CSRF protection out of the box, and that if you want > >> this kind of protection, you will have to do it yourself (which is > >> probably not really difficult; though I think many people are not aware > >> of these kind of attack vectors and don't even think about it, which is > >> why it would be nice if Wicket *could* do it out of the box). > >> > >> I believe that answers the original question, that CSRF protection is > >> *NOT* a security feature offered by Wicket. > >> > >> Regards, > >> Sebastiaan > >> > >> Nino Saturnino Martinez Vazquez Wael wrote: > >>> While that is true.. It's also true that wicket devs favor stuff > proven > >>> with a quickstart, because it becomes easier to make a fix for > something > >>> you can see in code.. > >>> > >>> So as I've written once before a quickstart should be the way to go or > >>> just use one of the existing applications, phone book or blog tutorial > >>> etc. And make a hack at that... > >>> > >>> regards Nino > >>> > >>> Ned Collyer wrote: > >>>> Nick, I think you would be quite surprised at the level of auditing > >>>> something > >>>> has to pass to be used in a financial system, especially a bank. > >>>> (unless u > >>>> have some dodgy bank) > >>>> > >>>> If something is theoretically possible, then thats as good as > "proven". > >>>> > >>>> Gotta remember that hackers are a lot smarter in many instances than > >> the > >>>> people who wrote the software to keep them out. > >>>> > >>>> > >>>> Nick Heudecker wrote: > >>>> > >>>>> Arthur, > >>>>> > >>>>> Only what you can *prove* matters, not what you think. Have you > >> created > >>>>> an > >>>>> example application with a CSRF attack? > >>>>> > >>>>> > >>>> > >> > > > >