javax.servlet.ServletException:可能的CSRF攻击。参考标题:

时间:2015-09-10 21:42:15

标签: csrf reverse-proxy wso2is csrf-protection

我使用两个WSO2 Identity Server作为后端和Apache HTTP作为前端负载均衡器

在测试浏览器URL https://lab1.xx.xx/dashboard时,我在WSO2控制台日志中看到以下错误:

TID: [0] [IS] [2015-09-10 16:59:22,846] ERROR {org.wso2.carbon.tomcat.ext.valves.CompositeValve} -  Could not handle request: /portal/gadgets/user_profile/js/main.js {org.wso2.carbon.tomcat.ext.valves.CompositeValve}
javax.servlet.ServletException: Possible CSRF attack. Refer header : https://lab1.xx.xx/dashboard/
        at org.wso2.carbon.ui.valve.CSRFValve.validateRefererHeader(CSRFValve.java:123)
        at org.wso2.carbon.ui.valve.CSRFValve.validatePatterns(CSRFValve.java:96)
        at org.wso2.carbon.ui.valve.CSRFValve.invoke(CSRFValve.java:71)
        at org.wso2.carbon.tomcat.ext.valves.CompositeValve.continueInvocation(CompositeValve.java:178)
        at org.wso2.carbon.tomcat.ext.valves.CarbonTomcatValve$1.invoke(CarbonTomcatValve.java:47)
        at org.wso2.carbon.webapp.mgt.TenantLazyLoaderValve.invoke(TenantLazyLoaderValve.java:57)
        at org.wso2.carbon.tomcat.ext.valves.TomcatValveContainer.invokeValves(TomcatValveContainer.java:47)
        at org.wso2.carbon.tomcat.ext.valves.CompositeValve.invoke(CompositeValve.java:141)
        at org.wso2.carbon.tomcat.ext.valves.CarbonStuckThreadDetectionValve.invoke(CarbonStuckThreadDetectionValve.java:156)
        at org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:950)
        at org.wso2.carbon.tomcat.ext.valves.CarbonContextCreatorValve.invoke(CarbonContextCreatorValve.java:52)
        at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116)
        at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:408)
        at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1070)
        at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:611)
        at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1736)
        at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1695)
        at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
        at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)
        at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
        at java.lang.Thread.run(Thread.java:745)

我申请了补丁ID:WSO2-CARBON-PATCH-4.2.0-1256和WSO2-IS-5.0.0-SP01

    <CSRFPreventionConfig>
            <Enabled>true</Enabled>
            <Rule>allow</Rule>

            <Patterns>
                    <Pattern>carbon</Pattern>
                    <Pattern>commonauth</Pattern>
                    <Pattern>samlsso</Pattern>
                    <Pattern>authenticationendpoint</Pattern>
                    <Pattern>wso2</Pattern>
                    <Pattern>oauth2</Pattern>
                    <Pattern>openid</Pattern>
                    <Pattern>openidserver</Pattern>
                    <Pattern>passivests</Pattern>
                    <Pattern>services</Pattern>
            </Patterns>

            <WhiteList>
                    <Url>https://localhost:9443</Url>
            </WhiteList>
    </CSRFPreventionConfig>

任何提示如何设置CSRF白名单?

问候,Raybar

2 个答案:

答案 0 :(得分:3)

更改/repository/conf/carbon.xml文件,并在WhiteList元素上添加文本为https://lab1.xx.xx的Url元素。

更改后,该部分必须显示为:

<WhiteList>
    <Url>https://localhost:9443</Url>
    <Url>https://lab1.xx.xx</Url>
</WhiteList>

答案 1 :(得分:0)

我添加白名单,但不起作用,我仍然看到相同的错误日志。 它可能会被添加到其他地方吗?

我的/repository/conf/carbon.xml文件:

    <CSRFPreventionConfig>
        <Enabled>false</Enabled>
        <Rule>allow</Rule>

        <Patterns>
                <Pattern>carbon</Pattern>
                <Pattern>commonauth</Pattern>
                <Pattern>samlsso</Pattern>
                <Pattern>authenticationendpoint</Pattern>
                <Pattern>wso2</Pattern>
                <Pattern>oauth2</Pattern>
                <Pattern>openid</Pattern>
                <Pattern>openidserver</Pattern>
                <Pattern>passivests</Pattern>
                <Pattern>services</Pattern>
                <Pattern>dashboard</Pattern>
        </Patterns>

        <WhiteList>
                <Url>https://localhost:9443</Url>
                <Url>https://ssohalab2.xx.xx:9443</Url>
                <Url>https://lab1.xx.xx/dashboard/*</Url>
        </WhiteList>
</CSRFPreventionConfig>

https://ssohalab2.xx.xx:9443 ---&gt; SSO服务器

https://lab1.xx.xx/dashboard/ * ---&gt;反向代理

问候,Raybar

相关问题