mirror of
https://github.com/discourse/discourse.git
synced 2025-05-21 18:12:32 +08:00
we can't trust CSRF for anon the way it is designed.
The page they have loaded may be cached we need a different way of delivering the CSRF potentially
This commit is contained in:
@ -1,4 +1,9 @@
|
||||
class SessionController < ApplicationController
|
||||
|
||||
# we need to allow account login with bad CSRF tokens, if people are caching, the CSRF token on the
|
||||
# page is going to be empty, this means that server will see an invalid CSRF and blow the session
|
||||
# once that happens you can't log in with social
|
||||
skip_before_filter :verify_authenticity_token, only: [:create]
|
||||
|
||||
def create
|
||||
requires_parameter(:login, :password)
|
||||
|
Reference in New Issue
Block a user