Skip to content

Commit

Permalink
Update general/development/policies/security/crosssite-request-forger…
Browse files Browse the repository at this point in the history
…y.md

Co-authored-by: Andrew Lyons <andrew@nicols.co.uk>
  • Loading branch information
kabalin and andrewnicols authored Jul 29, 2024
1 parent c1e6c75 commit c0a9647
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ It may be a bit surprising, but this type of attack may be used against servers

The most important protection is the concept CSRF token, which is for historic reasons called **sesskey** in Moodle.

When you log in, Moodle generates random string and stores it in the session. Whenever it prints a link or a button to perform a significant action, it adds the sesskey value to the submitted data. Before performing the action, it checks the sesskey value in the request with the one in the session, and the action is only performed if the two match.
When you log in, Moodle generates a random string and stores it in the session. Whenever it prints a link or a button to perform a significant action, it adds the sesskey value to the submitted data. Before performing the action, it checks the sesskey value in the request with the one in the session, and the action is only performed if the two match.

Therefore, the request to delete a user is actually something like below and there is no way for Evil Hacker to know what the sesskey is, so they cannot construct an URL that tricks the admin into deleting a user: `http://example.com/moodle/user/delete.php?id=123&confirm=1&sesskey=E8i5BCxLJR`

Expand Down

0 comments on commit c0a9647

Please sign in to comment.