Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
Y
yii2
Project
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
PSDI Army
yii2
Commits
989b8fa5
Commit
989b8fa5
authored
Apr 25, 2013
by
Qiang Xue
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Added CSRF support.
parent
7dd1f884
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
99 additions
and
4 deletions
+99
-4
Html.php
framework/helpers/base/Html.php
+7
-3
Request.php
framework/web/Request.php
+91
-0
User.php
framework/web/User.php
+1
-1
No files found.
framework/helpers/base/Html.php
View file @
989b8fa5
...
@@ -293,12 +293,16 @@ class Html
...
@@ -293,12 +293,16 @@ class Html
$hiddenInputs
=
array
();
$hiddenInputs
=
array
();
if
(
strcasecmp
(
$method
,
'get'
)
&&
strcasecmp
(
$method
,
'post'
))
{
$request
=
Yii
::
$app
->
getRequest
();
// simulate PUT, DELETE, etc. via POST
if
(
$request
instanceof
Request
)
{
if
((
$request
=
Yii
::
$app
->
getRequest
())
instanceof
Request
)
{
if
(
strcasecmp
(
$method
,
'get'
)
&&
strcasecmp
(
$method
,
'post'
))
{
// simulate PUT, DELETE, etc. via POST
$hiddenInputs
[]
=
static
::
hiddenInput
(
$request
->
restVar
,
$method
);
$hiddenInputs
[]
=
static
::
hiddenInput
(
$request
->
restVar
,
$method
);
$method
=
'post'
;
$method
=
'post'
;
}
}
if
(
$request
->
enableCsrfValidation
)
{
$hiddenInputs
[]
=
static
::
hiddenInput
(
$request
->
csrfTokenName
,
$request
->
getCsrfToken
());
}
}
}
if
(
!
strcasecmp
(
$method
,
'get'
)
&&
(
$pos
=
strpos
(
$action
,
'?'
))
!==
false
)
{
if
(
!
strcasecmp
(
$method
,
'get'
)
&&
(
$pos
=
strpos
(
$action
,
'?'
))
!==
false
)
{
...
...
framework/web/Request.php
View file @
989b8fa5
...
@@ -18,6 +18,27 @@ use yii\base\InvalidConfigException;
...
@@ -18,6 +18,27 @@ use yii\base\InvalidConfigException;
class
Request
extends
\yii\base\Request
class
Request
extends
\yii\base\Request
{
{
/**
/**
* @var boolean whether to enable CSRF (Cross-Site Request Forgery) validation. Defaults to false.
* By setting this property to true, forms submitted to an Yii Web application must be originated
* from the same application. If not, a 400 HTTP exception will be raised.
*
* Note, this feature requires that the user client accepts cookie. Also, to use this feature,
* forms submitted via POST method must contain a hidden input whose name is specified by [[csrfTokenName]].
* You may use [[\yii\web\Html::beginForm()]] to generate his hidden input.
* @see http://en.wikipedia.org/wiki/Cross-site_request_forgery
*/
public
$enableCsrfValidation
=
false
;
/**
* @var string the name of the token used to prevent CSRF. Defaults to 'YII_CSRF_TOKEN'.
* This property is effectively only when {@link enableCsrfValidation} is true.
*/
public
$csrfTokenName
=
'_csrf'
;
/**
* @var array the configuration of the CSRF cookie. This property is used only when [[enableCsrfValidation]] is true.
* @see Cookie
*/
public
$csrfCookie
=
array
(
'httponly'
=>
true
);
/**
* @var boolean whether cookies should be validated to ensure they are not tampered. Defaults to true.
* @var boolean whether cookies should be validated to ensure they are not tampered. Defaults to true.
*/
*/
public
$enableCookieValidation
=
true
;
public
$enableCookieValidation
=
true
;
...
@@ -35,6 +56,7 @@ class Request extends \yii\base\Request
...
@@ -35,6 +56,7 @@ class Request extends \yii\base\Request
private
$_cookies
;
private
$_cookies
;
/**
/**
* Resolves the current request into a route and the associated parameters.
* Resolves the current request into a route and the associated parameters.
* @return array the first element is the route, and the second is the associated parameters.
* @return array the first element is the route, and the second is the associated parameters.
...
@@ -42,6 +64,8 @@ class Request extends \yii\base\Request
...
@@ -42,6 +64,8 @@ class Request extends \yii\base\Request
*/
*/
public
function
resolve
()
public
function
resolve
()
{
{
$this
->
validateCsrfToken
();
$result
=
Yii
::
$app
->
getUrlManager
()
->
parseRequest
(
$this
);
$result
=
Yii
::
$app
->
getUrlManager
()
->
parseRequest
(
$this
);
if
(
$result
!==
false
)
{
if
(
$result
!==
false
)
{
list
(
$route
,
$params
)
=
$result
;
list
(
$route
,
$params
)
=
$result
;
...
@@ -699,5 +723,72 @@ class Request extends \yii\base\Request
...
@@ -699,5 +723,72 @@ class Request extends \yii\base\Request
}
}
return
$this
->
_cookies
;
return
$this
->
_cookies
;
}
}
private
$_csrfToken
;
/**
* Returns the random token used to perform CSRF validation.
* The token will be read from cookie first. If not found, a new token will be generated.
* @return string the random token for CSRF validation.
* @see enableCsrfValidation
*/
public
function
getCsrfToken
()
{
if
(
$this
->
_csrfToken
===
null
)
{
$cookies
=
$this
->
getCookies
();
if
((
$this
->
_csrfToken
=
$cookies
->
getValue
(
$this
->
csrfTokenName
))
===
null
)
{
$cookie
=
$this
->
createCsrfCookie
();
$this
->
_csrfToken
=
$cookie
->
value
;
$cookies
->
add
(
$cookie
);
}
}
return
$this
->
_csrfToken
;
}
/**
* Creates a cookie with a randomly generated CSRF token.
* Initial values specified in [[csrfCookie]] will be applied to the generated cookie.
* @return Cookie the generated cookie
* @see enableCsrfValidation
*/
protected
function
createCsrfCookie
()
{
$options
=
$this
->
csrfCookie
;
$options
[
'name'
]
=
$this
->
csrfTokenName
;
$options
[
'value'
]
=
sha1
(
uniqid
(
mt_rand
(),
true
));
return
new
Cookie
(
$options
);
}
/**
* Performs the CSRF validation.
* The method will compare the CSRF token obtained from a cookie and from a POST field.
* If they are different, a CSRF attack is detected and a 400 HTTP exception will be raised.
* @throws HttpException if the validation fails
*/
public
function
validateCsrfToken
()
{
if
(
!
$this
->
enableCsrfValidation
)
{
return
;
}
$method
=
$this
->
getRequestMethod
();
if
(
$method
===
'POST'
||
$method
===
'PUT'
||
$method
===
'DELETE'
)
{
$cookies
=
$this
->
getCookies
();
switch
(
$method
)
{
case
'POST'
:
$token
=
$this
->
getPost
(
$this
->
csrfTokenName
);
break
;
case
'PUT'
:
$token
=
$this
->
getPut
(
$this
->
csrfTokenName
);
break
;
case
'DELETE'
:
$token
=
$this
->
getDelete
(
$this
->
csrfTokenName
);
}
if
(
empty
(
$token
)
||
$cookies
->
getValue
(
$this
->
csrfTokenName
)
!==
$token
)
{
throw
new
HttpException
(
400
,
Yii
::
t
(
'yii|Unable to verify your data submission.'
));
}
}
}
}
}
framework/web/User.php
View file @
989b8fa5
...
@@ -56,7 +56,7 @@ class User extends Component
...
@@ -56,7 +56,7 @@ class User extends Component
* @var array the configuration of the identity cookie. This property is used only when [[enableAutoLogin]] is true.
* @var array the configuration of the identity cookie. This property is used only when [[enableAutoLogin]] is true.
* @see Cookie
* @see Cookie
*/
*/
public
$identityCookie
=
array
(
'name'
=>
'_
_
identity'
,
'httponly'
=>
true
);
public
$identityCookie
=
array
(
'name'
=>
'_identity'
,
'httponly'
=>
true
);
/**
/**
* @var integer the number of seconds in which the user will be logged out automatically if he
* @var integer the number of seconds in which the user will be logged out automatically if he
* remains inactive. If this property is not set, the user will be logged out after
* remains inactive. If this property is not set, the user will be logged out after
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment