-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Apollo Server and CSRF protection. #1590
Comments
There was a vulnerability in Flash player that allowed bypassing CSRF protection with According to the author it's fixed in all modern browsers, and only works on IE with File URI (but not with http/https). |
This comment has been minimized.
This comment has been minimized.
Apollo Server isn't unlike any other server in this regard, and as noted in the original body, barring any browser-based bugs (which, let's be honest, the underlying security model here leans on heavily, outside of Apollo Server), limiting usage to Depending on exactly what server integration is (e.g. Hapi, Koa, etc) at play, along with what other middleware (besides Apollo) are in use, you should take precautions to ensure that you are not subjected to the risks of CSRF. Keep in mind that if you wish to only accept |
Guys,
I am really sad not seeing any results in these issues if I look for the word: "CSRF".
I read a lot around:
However, I am not yet able to understand if our endpoint ("/graphql") is protected for this type of attack or if it is necessary to protect it with solutions like this: https://github.com/expressjs/csurf.
The thing that is not clear to me is that here: https://github.com/pillarjs/understanding-csrf they say:
If we restrict our endpoint to just use
Content-Type: application/json
are we safe?The text was updated successfully, but these errors were encountered: