I need to add CSRF protection to a web application.
The problem is that the application is heavily dependent on links (GET requests that are) to make changes to the database.
Links are generated using the class, so I can easily add an extra parameter for the CSRF token for each link.
However, I understand that the CSRF token in the GET request may not be sufficiently protected.
Please note that the application is accessible only through HTTPS, therefore GET transmission parameters cannot be set / stolen during data exchange between the client and server (but the problem with history theft remains).
Could the GET CEFF token be considered "fairly safe" in this setting?
If not, what is the best way to solve this problem? The only thing that comes to my mind is to wrap each of my links in a form (broadcast explicitly or create an onSubmit form using JavaScript).
source share