This is enough to protect CSRF:
$_SESSION['hash']
$_POST['thing']
One of my site users tells me that my site is vulnerable, but I can’t say if it just trolled me. Is there anything else I can do?
, . , , . . , , , 100% .
, , - , , CSRF? .
, - , , php . , ssh telnet. , .
, cookie cookie.
, CSRF, . , , , , , .
, , , .
Chris CRSF. :
, . , . , , .
from: http://en.wikipedia.org/wiki/Cross-site_request_forgery
, ...
Source: https://habr.com/ru/post/1788750/More articles:Asp.net session security - asp.netУдаленная отладка программы Android NDK от eclipse - androidCan I access the name of the calling function programmatically? - c ++How to get the position of a selected PathItem Illustrator object in pixels using? - jsxC # Mongo Driver - MongoCollection.Group method - c #How to take a screenshot from a webpage using C # and ASP.NET? - htmlInterface and its availability - designIs there a Java library that can help draw cellular automata? - javaFloating conversion integer in C - cI cannot add the latest MX record for Google Apps email, because Zerigo DNS only allows 10 records. Will it make a difference? - dnsAll Articles