Gå ubegrenset med Magzter GOLD

Gå ubegrenset med Magzter GOLD

Få ubegrenset tilgang til over 9000 magasiner, aviser og premiumhistorier for bare

$149.99
 
$74.99/År

Prøve GULL - Gratis

The Right Ways to Address Cross-Site Request Forgery

Open Source For You

|

June 2025

Here’s an overview of the key concepts, impact and effective mitigation strategies of cross-site request forgery, also known as CSRF.

- Sanjay Phanshikar and Divyasri Thota

The Right Ways to Address Cross-Site Request Forgery

CSRF (cross-site request forgery) was included in the OWASP (Open Worldwide Application Security Project) Top 10 list in 2013 but was removed from it in 2017 as the statistical data did not justify its place there. However, CSRF still impacts web applications a great deal.

The effect of a CSRF exploit varies from case to case. There are multiple factors that decide the severity of the exploit, which could be:

  • Unauthorised actions [money transfer, account setting changes]

  • Privilege escalation [admin access]

  • Application integrity and confidentiality loss [data theft]

  • Possible loss of reputation [negative image within users or communities]

SOP (Same-Origin Policy)

To understand why CSRF is successful, one needs to understand the Same-Origin Policy (SOP) used by browsers. The latter follow SOP by default and only allow requests from the same origin. However, there is a business need for the user to make a cross-origin or cross-domain request to the application server. There are a lot of security concerns around allowing cross-domain requests. Initially, browser implementations used CORS (cross-origin resource sharing) to accommodate cross-domain requests while taking security concerns into consideration. Recent implementations have come up with a cookie attribute called ‘SameSite’. Let us discuss CORS and SameSite in brief.

imageTo address the need of cross-origin requests, CORS specifications are used, and browsers are made compliant with CORS specs. Application servers explicitly whitelist the trusted domains from where they can accept cross-origin requests and browsers are directed accordingly, using CORS-specific response headers.

FLERE HISTORIER FRA Open Source For You

Open Source For You

Open Source For You

AIOps: The Next Leap in IT Operations

Today's complex IT environments are best managed by AIOps, which does not replace but adds an intelligence layer to traditional DevOps.

time to read

2 mins

September 2025

Open Source For You

Open Source For You

How to Choose Between Terraform, Pulumi, and OpenTofu

Discover the differences, strengths, and ideal use cases of Terraform, Pulumi, and OpenTofu in the Infrastructure as Code landscape.

time to read

3 mins

September 2025

Open Source For You

Open Source For You

Quantum 2.0: The Next Big Tech Revolution

Quantum tech is no longer science fiction. From computing to cryptography, here's how India is gearing up for a quantum-powered future.

time to read

7 mins

September 2025

Open Source For You

Open Source For You

Neo4j onboards Ish Thukral as general manager for India and SAARC

India and SAARC Neo4j has announced the appointment of Ish Thukral as general manager for India and the SAARC region, reinforcing the company’s strategic focus on the subcontinent.

time to read

1 mins

September 2025

Open Source For You

Open Source For You

Docker: Powering the Next Wave of Software Development

In a world where organisations are transforming their infrastructure to house AI-based solutions, Docker and Kubernetes are proving to be powerhouses for developing secure and scalable software that is delivered with speed.

time to read

6 mins

September 2025

Open Source For You

Open Source For You

DevSecOps: Building Secure Software with Open Source Tools

Security needs to be embedded in the design of all modern software products. This is where DevSecOps and its toolchain play a significant role. Find out how they help, and what are the best practices for implementing this toolchain.

time to read

16 mins

September 2025

Open Source For You

Open Source For You

The Network Stack: Helping Linux Systems Communicate

The socket stack, the protocol stack and the network device drivers in the latest Linux versions offer great support for networking. This is how they work...

time to read

3 mins

September 2025

Open Source For You

Open Source For You

Hugging Face introduces an open source, no-code toolkit

Hugging Face has launched AI Sheets, an open source, no-code toolkit that lets users work with datasets using thousands of AI models.

time to read

1 min

September 2025

Open Source For You

Open Source For You

Visualising Data with Open Source Tools

Open source offers a varied range of tools to help interpret data better by visualising it. These tools offer customisation, cost-effectiveness, and community-backed development.

time to read

7 mins

September 2025

Open Source For You

Open Source For You

AI-Driven Data Centre Builder: An Emerging Reality

The Al-driven data centre builder leverages AI to optimise network architecture and host design, helping organisations build data centres that are intelligent, adaptive, and efficient.

time to read

3 mins

September 2025

Listen

Translate

Share

-
+

Change font size