mirror of
https://github.com/discourse/discourse.git
synced 2025-09-07 12:02:53 +08:00
we can't trust CSRF for anon the way it is designed.
The page they have loaded may be cached we need a different way of delivering the CSRF potentially
This commit is contained in:
parent
4d2c28e8b2
commit
42494b5bb1
5 changed files with 21 additions and 2 deletions
|
@ -1,4 +1,9 @@
|
|||
class SessionController < ApplicationController
|
||||
|
||||
# we need to allow account login with bad CSRF tokens, if people are caching, the CSRF token on the
|
||||
# page is going to be empty, this means that server will see an invalid CSRF and blow the session
|
||||
# once that happens you can't log in with social
|
||||
skip_before_filter :verify_authenticity_token, only: [:create]
|
||||
|
||||
def create
|
||||
requires_parameter(:login, :password)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue