NAME

Catalyst::Plugin::CSRFToken - Generate tokens to help prevent CSRF attacks

SYNOPSIS

   package MyApp;
   use Catalyst;

   # The default functionality of this plugin expects a method 'sessionid' which
   # is associated with the current user session.  This method is provided by the
   # session plugin but you can provide your own or override 'default_csrf_session_id'
   # if you know what you are doing!

   MyApp->setup_plugins([qw/
     Session
     Session::State::Cookie
     Session::Store::Cookie
     CSRFToken
   /]);

   MyApp->config(
     'Plugin::CSRFToken' => { default_secret=>'changeme', auto_check_csrf_token => 1 }
   );
        
   MyApp->setup;

   package MyApp::Controller::Root;

   use Moose;
   use MooseX::MethodAttributes;

   extends 'Catalyst::Controller';

   sub login_form :Path(login_form) Args(0) {
     my ($self, $c) = @_;

     # A Basic manual check example if you leave 'auto_check_csrf_token' off (default)
     if($c->req->method eq 'POST') {
       Catalyst::Exception->throw(message => 'csrf_token failed validation')
         unless $c->check_csrf_token;
     }

     $c->stash(csrf_token => $c->csrf_token);  # send a token to your view and make sure you
                                               # add it to your form as a hidden field
   }

DESCRIPTION

This uses WWW::CSRF to generate hard to guess tokens tied to a give web session. You can generate a token and pass it to your view layer where it should be added to the form you are trying to process, typically as a hidden field called 'csrf_token' (althought you can change that in configuration if needed).

Its probably best to enable 'auto_check_csrf_token' true since that will automatically check all POST, bPUT and PATCH request (but of course if you do this you have to be sure to add the token to every single form. If you need to just use this on a few forms (for example you have a large legacy application and need to improve security in steps) you can roll your own handling via the check_csrf_token method as in the example given above.

METHODS

This Plugin adds the following methods

csrf_token

Generates a token for the current request path and user session and returns this string in a form suitable to put into an HTML form hidden field value.

check_csrf_token

Return true or false depending on if the current request has a token which is valid.

CONFIGURATION

This plugin permits the following configurations keys

default_secret

String that is used in part to generate the token to help ensure its hard to guess.

max_age

Default to 3600 seconds (one hour). This is the length of time before the generated token is considered expired. One hour is probably too long. You should set it to the shortest time reasonable.

param_key

Defaults to 'csrf_token'. The Body param key we look for the token.

auto_check_csrf_token

Defaults to false. When set to true we automatically do a check for all POST, PATCH and PUT method requests and if the check fails we delegate handling in the following way:

If the current controller does a method called 'handle_failed_csrf_token_check' we invoke that passing the current context.

Else if the application class does a method called 'handle_failed_csrf_token_check' we invoke that instead.

Failing either of those we just throw an expection which you can catch manually in the global 'end' action or else it will fail thru eventually to Catalyst's default error handler.

AUTHOR

 John Napiorkowski <jnapiork@cpan.org>

COPYRIGHT

Copyright (c) 2022 the above named AUTHOR

LICENSE

You may distribute this code under the same terms as Perl itself.