Difference between revisions of "Category:OWASP CSRFGuard Project"
|Line 1:||Line 1:|
== Overview ==
== Overview ==
to the [http://www..com/.] [[Cross-Site Request Forgery]] (CSRF) is the into a are . is the of the of the request . The to the of the of .
== License ==
== License ==
Revision as of 16:57, 6 December 2010
Welcome to the home of the OWASP CSRFGuard Project! OWASP CSRFGuard is a library that implements a variant of the synchronizer token pattern to mitigate the risk of Cross-Site Request Forgery (CSRF) attacks. The OWASP CSRFGuard library is integrated through the use of a JavaEE Filter and exposes various automated and manual ways to integrate per-session or pseudo-per-request tokens into HTML. When a user interacts with this HTML, CSRF prevention tokens (i.e. cryptographically random synchronizer tokens) are submitted with the corresponding HTTP request. It is the responsibility of OWASP CSRFGuard to ensure the token is present and is valid for the current HTTP request. Any attempt to submit a request to a protected resource without the correct corresponding token is viewed as a CSRF attack in progress and is discarded. Prior to discarding the request, CSRFGuard can be configured to take one or more actions such as logging aspects of the request and redirecting the user to a landing page. The latest release enhances this strategy to support the optional verification of HTTP requests submitted using Ajax as well as the optional verification of referrer headers.
You can sign up for the OWASP CSRFGuard email list here https://lists.owasp.org/mailman/listinfo/owasp-csrfguard
You can access the SVN repository online at: http://owaspcsrfguard.googlecode.com
Deprecated Releases - article containing several download references to deprecated and officially unsupported releases
Click here to view the installation instructions of the OWASP CSRFGuard 1.0 series.
Click here to view the installation instructions of the OWASP CSRFGuard 2.0 series.
Click here to view the road map for the latest development version of CSRFGuard. Please feel free to add your own change requests or send me patches/diffs!
CSRF Testing Tool
Check out the OWASP CSRF Tester tool which allows you to test for CSRF vulnerabilities. This tool is also written in Java.
CSRF Prevention Cheat Sheet
Please see the OWASP CSRF Prevention Cheat Sheet for more information on prevention.
Feedback and Participation
We hope you find CSRFGuard useful. Please contribute back to the project by sending your comments, questions, and suggestions to OWASP. Thanks!
There are a small number of other projects that implement the unique random request token concept similar to that of CSRFGuard. They are as follows:
The Open Web Application Security Project is purely an open-source community driven effort. As such, all projects and research efforts are contributed and maintained with an individual's spare time. If you have found this or any other project useful, please support OWASP with a donation.