Skip to content

Is protection against CSRF really needed in client with oauth2Login? #234

Answered by ch4mpy
ASarco asked this question in Q&A
Discussion options

You must be logged in to vote

there's no way it can be read by, for example, badguys.com

As I wrote above an attacker doesn't need to read the session cookie to run a CSRF attack.

Just read the article I linked, along with a few other results from your favorite search engine with the sentence I put above. I won't write such an article here.

Now, what if all users only have best intentions, do no mistakes, and badguys keep away from your app? Well, you can disable all security (not just CSRF). I do not have this chance and will keep CSRF protection enabled.

Replies: 2 comments 1 reply

Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
1 reply
@ch4mpy
Comment options

Answer selected by ch4mpy
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants