Security for browser forms
Project description
Introduction
This package contains utilities that can help to protect parts of Plone or applications build on top of the Plone framework.
Form authentication
A common problem in web applications is Cross Site Request Forgery or CSRF. This is an attack method in which an attacker tricks a browser to do a HTTP form submit to another site. To do this the attacker needs to know the exact form parameters. Form authentication is a method to make it impossible for an attacker to predict those paramters by adding an extra authenticator which can be verified.
To use the form authenticator you first need to insert it into your form. This can be done using a simple TAL statement inside your form:
<span tal:replace="structure context/@@authenticator/authenticator"/>
this will produce a HTML input element with the authentication information. Next you need to add logic somewhere to verify the authenticator. This can be done using a call to the authenticator view. For example:
authenticator=getMultiAdapter((request, context), name=u"authenticator") if not authenticator.verify(): raise Unauthorised:
You can do the same thing more conveniently using a function decorator:
from plone.app.protect.authenticator import AuthenticateFrom @AuthenticateFrom def manage_doSomething(self, param, REQUEST=None): pass
This only works for methods which have a parameter called REQUEST.
Changelog
1.0a1 - January 27, 2008
Initial release [wichert]
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for plone.app.protect-1.0a1-py2.4.egg
Algorithm | Hash digest | |
---|---|---|
SHA256 | 05974307460fd4f13b95301b7dd7f15ea6e97e051a79bfaf442bf7149b426670 |
|
MD5 | f46fab3e1874a5dda4b8b01ccf799206 |
|
BLAKE2b-256 | 5ad6c566ddfd56b92816fc6fec78c4d2213eda4e7ca670d1b9bb2785599f84e9 |