Closed AutismJH closed 6 years ago
Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf[1]) or XSRF, is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts.[2] There are many ways in which a malicious website can transmit such commands; specially-crafted image tags, hidden forms, and JavaScript XMLHttpRequests, for example, can all work without the user's interaction or even knowledge. Unlike cross-site scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser.
CSRF commonly has the following characteristics:
It involves sites that rely on a user's identity. It exploits the site's trust in that identity. It tricks the user's browser into sending HTTP requests to a target site. It involves HTTP requests that have side effects.
Closing this as it doesn't relate to the mobile module, CSRF is protected by the above mentioned SecurityID token. In the future, please use security@silverstripe.org to disclose any potential security issues.
If this represents a security issue related to the SilverStripe CMS, please email the details to security@silverstripe.org rather than reporting it on GitHub.
After the administrator logged in, open the following page to add an administrator.