-
Notifications
You must be signed in to change notification settings - Fork 32
csrf vulnerability #111
Comments
@dokzlo13 Thanks for detailed analyses! It's huge work, thank you! May you please suggest how save api and don't get anyway for attack via csrf? |
@recoilme Or you can unwarily follow link, like In future, this can provide more unsafe behavior with newly implemented functions. I think, the correct solution is to use the CSRF tokens with double-submit cookies on typegram-web. You can read more here in russian. Also i will perform security audit on typegram api soon |
@dokzlo13 i try Content-Security-Policy and disable Access-Control-Allow-Origin |
@dokzlo13 this vector closed i think https://dokzlo13.github.io/typegram_attacks/post.html Delete must not work because of cors + get But i need to guard all post methods (comments and so) and migrate on post get methods( |
|
Has found many CSRF-vulnerable methods in Typegram source code. Descibe it with some snippets in my repo
I have no experience in golang, so I can not yet contribute to the project, may be anyone can help with security fixes?
The text was updated successfully, but these errors were encountered: