summaryrefslogtreecommitdiff
path: root/django/middleware/csrf.py
diff options
context:
space:
mode:
authorChris Jerdonek <chris.jerdonek@gmail.com>2021-05-31 04:26:11 -0700
committerMariusz Felisiak <felisiak.mariusz@gmail.com>2021-06-01 09:02:27 +0200
commitcd19db10df6225e01b77685397a88c9cdf216dd1 (patch)
treef00918fc29389fa81001c0fa3650d398dd1afcbe /django/middleware/csrf.py
parent623cec0879e09e8ad804c213157e51e764f5d826 (diff)
Fixed #32796 -- Changed CsrfViewMiddleware to fail earlier on badly formatted cookie tokens.
Diffstat (limited to 'django/middleware/csrf.py')
-rw-r--r--django/middleware/csrf.py23
1 files changed, 15 insertions, 8 deletions
diff --git a/django/middleware/csrf.py b/django/middleware/csrf.py
index 3febfd9486..5d77b19c7c 100644
--- a/django/middleware/csrf.py
+++ b/django/middleware/csrf.py
@@ -217,14 +217,12 @@ class CsrfViewMiddleware(MiddlewareMixin):
except KeyError:
return None
- try:
- csrf_token = _sanitize_token(cookie_token)
- except InvalidTokenFormat:
- csrf_token = _get_new_csrf_token()
+ # This can raise InvalidTokenFormat.
+ csrf_token = _sanitize_token(cookie_token)
if csrf_token != cookie_token:
- # Cookie token needed to be replaced;
- # the cookie needs to be reset.
+ # Then the cookie token had length CSRF_SECRET_LENGTH, so flag
+ # to replace it with the masked version.
request.csrf_cookie_needs_reset = True
return csrf_token
@@ -318,7 +316,12 @@ class CsrfViewMiddleware(MiddlewareMixin):
raise RejectRequest(REASON_BAD_REFERER % referer.geturl())
def process_request(self, request):
- csrf_token = self._get_token(request)
+ try:
+ csrf_token = self._get_token(request)
+ except InvalidTokenFormat:
+ csrf_token = _get_new_csrf_token()
+ request.csrf_cookie_needs_reset = True
+
if csrf_token is not None:
# Use same token next time.
request.META['CSRF_COOKIE'] = csrf_token
@@ -374,7 +377,11 @@ class CsrfViewMiddleware(MiddlewareMixin):
# Access csrf_token via self._get_token() as rotate_token() may have
# been called by an authentication middleware during the
# process_request() phase.
- csrf_token = self._get_token(request)
+ try:
+ csrf_token = self._get_token(request)
+ except InvalidTokenFormat as exc:
+ return self._reject(request, f'CSRF cookie {exc.reason}.')
+
if csrf_token is None:
# No CSRF cookie. For POST requests, we insist on a CSRF cookie,
# and in this way we can avoid all CSRF attacks, including login