2020-10-19 23:56:17 +02:00
|
|
|
---
|
|
|
|
title: CSRF protection
|
|
|
|
summary: Protect destructive actions from cross-site request forgery
|
|
|
|
---
|
|
|
|
# Security & best practices
|
|
|
|
|
|
|
|
[CHILDREN asList]
|
|
|
|
|
|
|
|
[alert]
|
|
|
|
You are viewing docs for a pre-release version of silverstripe/graphql (4.x).
|
|
|
|
Help us improve it by joining #graphql on the [Community Slack](https://www.silverstripe.org/blog/community-slack-channel/),
|
|
|
|
and report any issues at [github.com/silverstripe/silverstripe-graphql](https://github.com/silverstripe/silverstripe-graphql).
|
|
|
|
Docs for the current stable version (3.x) can be found
|
|
|
|
[here](https://github.com/silverstripe/silverstripe-graphql/tree/3)
|
|
|
|
[/alert]
|
|
|
|
|
|
|
|
## CSRF tokens (required for mutations)
|
|
|
|
|
|
|
|
Even if your graphql endpoints are behind authentication, it is still possible for unauthorised
|
|
|
|
users to access that endpoint through a [CSRF exploitation](https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)). This involves
|
|
|
|
forcing an already authenticated user to access an HTTP resource unknowingly (e.g. through a fake image), thereby hijacking the user's
|
|
|
|
session.
|
|
|
|
|
|
|
|
In the absence of a token-based authentication system, like OAuth, the best countermeasure to this
|
|
|
|
is the use of a CSRF token for any requests that destroy or mutate data.
|
|
|
|
|
|
|
|
By default, this module comes with a `CSRFMiddleware` implementation that forces all mutations to check
|
|
|
|
for the presence of a CSRF token in the request. That token must be applied to a header named` X-CSRF-TOKEN`.
|
|
|
|
|
2021-06-30 11:48:52 +02:00
|
|
|
In Silverstripe CMS, CSRF tokens are most commonly stored in the session as `SecurityID`, or accessed through
|
2020-10-19 23:56:17 +02:00
|
|
|
the `SecurityToken` API, using `SecurityToken::inst()->getValue()`.
|
|
|
|
|
|
|
|
Queries do not require CSRF tokens.
|
|
|
|
|
|
|
|
### Disabling CSRF protection (for token-based authentication only)
|
|
|
|
|
|
|
|
If you are using HTTP basic authentication or a token-based system like OAuth or [JWT](https://github.com/Firesphere/silverstripe-graphql-jwt),
|
|
|
|
you will want to remove the CSRF protection, as it just adds unnecessary overhead. You can do this by setting
|
|
|
|
the middleware to `false`.
|
|
|
|
|
|
|
|
|
|
|
|
```yaml
|
2021-03-18 05:10:48 +01:00
|
|
|
SilverStripe\Core\Injector\Injector:
|
2020-10-19 23:56:17 +02:00
|
|
|
SilverStripe\GraphQL\QueryHandler\QueryHandlerInterface.default:
|
|
|
|
class: SilverStripe\GraphQL\QueryHandler\QueryHandler
|
|
|
|
properties:
|
|
|
|
Middlewares:
|
|
|
|
csrf: false
|
|
|
|
```
|
|
|
|
|
|
|
|
### Further reading
|
|
|
|
|
|
|
|
[CHILDREN]
|