-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bootstrap Modal is falsely blocked due to possible csrf attack #56
Comments
I am not sure this issue belongs here. |
https://issues.apache.org/jira/browse/WICKET-6101
On every request you get the log information which is a little bit annoying. When does the origin header is set? Only if the origin is different? The whitelist check is not executed cause the origin header is null. One must verify that this behavior is right. |
- revert changes - a conditional csrf listener is needed
Hey Marc,
i checked out your project yesterday an it works great so far.
I encountered a problem recently with the 'Wicket Bootstrap'-Api (https://github.com/l0rdn1kk0n/wicket-bootstrap).
As soon as i open a modal window the application recognizes a possible csrf attack because the origin of the request is empty.
Log says: INFO 869808 --- [nio-8080-exec-7] w.p.h.CsrfPreventionRequestCycleListener : Possible CSRF attack, request URL: http://localhost:8080/, Origin: null, action: allowed
Regards, pa7r1ck
The text was updated successfully, but these errors were encountered: