You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The current CSRT token in the OAuth2 filter state is a random string. This can be improved by signing the random string with the HMAC secret, adding protection agains CSRF token forgery.
From my point of view we can look into that later, if we even want to mitigate those threats. I am not sure which risks are accepted by envoy. But those mentioned from OWASP assume that the attacker can access envoys cookies via subdomain-takeover, subdomain-xss or ManInTheMiddle.
The text was updated successfully, but these errors were encountered:
The current CSRT token in the OAuth2 filter state is a random string. This can be improved by signing the random string with the HMAC secret, adding protection agains CSRF token forgery.
Originally commented by @denniskniep
#36276 (comment)
The text was updated successfully, but these errors were encountered: