NAME
Catalyst::Plugin::CSRFToken - Generate tokens to help prevent CSRF attacks
SYNOPSIS
package MyApp;
use Catalyst;
# The default functionality of this plugin expects a method 'sessionid' which
# is associated with the current user session. This method is provided by the
# session plugin but you can provide your own or override 'default_csrf_session_id'
# if you know what you are doing!
MyApp->setup_plugins([qw/
Session
Session::State::Cookie
Session::Store::Cookie
CSRFToken
/]);
MyApp->config(
'Plugin::CSRFToken' => { default_secret=>'changeme', auto_check_csrf_token => 1 }
);
MyApp->setup;
package MyApp::Controller::Root;
use Moose;
use MooseX::MethodAttributes;
extends 'Catalyst::Controller';
sub login_form :Path(login_form) Args(0) {
my ($self, $c) = @_;
# A Basic manual check example if you leave 'auto_check_csrf_token' off (default)
if($c->req->method eq 'POST') {
Catalyst::Exception->throw(message => 'csrf_token failed validation')
unless $c->check_csrf_token;
}
$c->stash(csrf_token => $c->csrf_token); # send a token to your view and make sure you
# add it to your form as a hidden field
}
DESCRIPTION
This uses WWW::CSRF to generate hard to guess tokens tied to a give web session. You can generate a token and pass it to your view layer where it should be added to the form you are trying to process, typically as a hidden field called 'csrf_token' (althought you can change that in configuration if needed).
Its probably best to enable 'auto_check_csrf_token' true since that will automatically check all POST, bPUT and PATCH request (but of course if you do this you have to be sure to add the token to every single form. If you need to just use this on a few forms (for example you have a large legacy application and need to improve security in steps) you can roll your own handling via the check_csrf_token
method as in the example given above.
METHODS
This Plugin adds the following methods
csrf_token
Generates a token for the current request path and user session and returns this string in a form suitable to put into an HTML form hidden field value.
check_csrf_token
Return true or false depending on if the current request has a token which is valid.
CONFIGURATION
This plugin permits the following configurations keys
default_secret
String that is used in part to generate the token to help ensure its hard to guess.
max_age
Default to 3600 seconds (one hour). This is the length of time before the generated token is considered expired. One hour is probably too long. You should set it to the shortest time reasonable.
param_key
Defaults to 'csrf_token'. The Body param key we look for the token.
auto_check_csrf_token
Defaults to false. When set to true we automatically do a check for all POST, PATCH and PUT method requests and if the check fails we delegate handling in the following way:
If the current controller does a method called 'handle_failed_csrf_token_check' we invoke that passing the current context.
Else if the application class does a method called 'handle_failed_csrf_token_check' we invoke that instead.
Failing either of those we just throw an expection which you can catch manually in the global 'end' action or else it will fail thru eventually to Catalyst's default error handler.
AUTHOR
John Napiorkowski <jnapiork@cpan.org>
COPYRIGHT
Copyright (c) 2022 the above named AUTHOR
LICENSE
You may distribute this code under the same terms as Perl itself.