Tag

CSRF

0 views collected around this technical thread.

Java Tech Enthusiast
Java Tech Enthusiast
Apr 27, 2025 · Frontend Development

Common Front-End Security Attacks, Principles, and Mitigations

The article outlines prevalent front‑end security threats such as XSS, SQL injection, CSRF, MITM, clickjacking, misconfiguration, and vulnerable dependencies, explains their underlying principles, and recommends practical mitigations including input validation, CSP, HTTPS/TLS, CSRF tokens, secure headers, regular audits, and dependency scanning.

CSRFClickjackingMITM
0 likes · 8 min read
Common Front-End Security Attacks, Principles, and Mitigations
php中文网 Courses
php中文网 Courses
Apr 3, 2025 · Information Security

How to Defend Against CSRF Attacks Using PHP

This article explains the fundamentals of CSRF attacks, how they exploit authenticated users' cookies, and provides practical PHP techniques—including token generation and verification, request‑origin checks, secure cookie settings, and safe login/logout handling—to effectively protect web applications.

CSRFPHPWeb Security
0 likes · 6 min read
How to Defend Against CSRF Attacks Using PHP
php中文网 Courses
php中文网 Courses
Mar 10, 2025 · Information Security

Security Protection Strategies and Vulnerability Mitigation for PHP Applications

This article examines essential security measures for PHP applications, covering protection against SQL injection, XSS, CSRF, unsafe file uploads, session fixation, weak passwords, error disclosure, and the importance of HTTPS, with practical code examples and configuration tips to build more resilient web services.

CSRFFile UploadHTTPS
0 likes · 8 min read
Security Protection Strategies and Vulnerability Mitigation for PHP Applications
php中文网 Courses
php中文网 Courses
Feb 13, 2025 · Information Security

Comprehensive PHP Security Best Practices: Dependency Management, Session Hardening, CSRF Protection, Input Validation, Type Declarations, Prepared Statements, Error Handling, and Security Testing

This article presents a thorough guide to securing PHP applications by managing Composer dependencies, hardening session handling, implementing CSRF defenses, sanitizing all inputs, enforcing strict type declarations, using prepared statements for database access, concealing sensitive error details, encapsulating critical operations, and incorporating security‑focused testing.

BackendCSRFPHP
0 likes · 16 min read
Comprehensive PHP Security Best Practices: Dependency Management, Session Hardening, CSRF Protection, Input Validation, Type Declarations, Prepared Statements, Error Handling, and Security Testing
Architect's Guide
Architect's Guide
Dec 17, 2024 · Backend Development

Debugging a SpringBoot CSRF 404 Error: From @GetMapping to @PostMapping

The author describes how changing a SpringBoot controller annotation from @GetMapping to @PostMapping caused a silent 404 error, how a teammate quickly fixed it by disabling CSRF, and how a visual tool helped reveal the underlying filter-chain behavior.

BackendCSRFJava
0 likes · 5 min read
Debugging a SpringBoot CSRF 404 Error: From @GetMapping to @PostMapping
php中文网 Courses
php中文网 Courses
Nov 14, 2024 · Information Security

Best Practices for Securing Laravel Web Applications

This article outlines essential Laravel security practices, including built‑in authentication, CSRF protection, input validation, HTTPS enforcement, secure session handling, regular dependency updates, and rate limiting, providing developers with concrete steps to protect web applications from common attacks.

AuthenticationCSRFHTTPS
0 likes · 6 min read
Best Practices for Securing Laravel Web Applications
360 Smart Cloud
360 Smart Cloud
Jul 15, 2024 · Information Security

Web Server Backend Security (Part 2): Logic Security (CSRF/CORS) and Data Security

This article explains backend web security concepts, detailing logical threats such as CSRF and CORS, their mechanisms, and protection strategies, and then discusses data security measures including access control, encryption, backups, monitoring, and software updates to safeguard web applications.

CORSCSRFWeb Security
0 likes · 12 min read
Web Server Backend Security (Part 2): Logic Security (CSRF/CORS) and Data Security
Cognitive Technology Team
Cognitive Technology Team
Feb 18, 2024 · Information Security

Understanding Cross‑Site Request Forgery (CSRF) and Its Prevention Techniques

This article explains what CSRF attacks are, how they exploit authenticated browsers through forged requests, outlines the three essential conditions for a successful attack, and presents practical defense measures such as token validation, cookie handling, secondary authentication, and code examples in Java and JSP.

CSRFJavaSpring Security
0 likes · 7 min read
Understanding Cross‑Site Request Forgery (CSRF) and Its Prevention Techniques
php中文网 Courses
php中文网 Courses
Feb 18, 2024 · Backend Development

Secure User Login and Logout Implementation in PHP

This article explains how to securely implement user login and logout functionality in PHP by using session management, server‑side validation, and CSRF token protection, providing sample code for authentication, session handling, and safe logout procedures.

AuthenticationCSRFLogout
0 likes · 6 min read
Secure User Login and Logout Implementation in PHP
php中文网 Courses
php中文网 Courses
Jan 31, 2024 · Information Security

How to Defend Against CSRF Attacks in PHP

This article explains the principles of CSRF attacks and provides practical PHP techniques to prevent them, including token generation and verification, checking Referer and Origin headers, configuring secure cookie attributes, and ensuring safe login and logout processes.

CSRFOriginPHP
0 likes · 5 min read
How to Defend Against CSRF Attacks in PHP
php中文网 Courses
php中文网 Courses
Oct 25, 2023 · Information Security

Common Security Vulnerabilities in PHP Web Applications and How to Prevent Them

This article outlines the most frequent security flaws found in PHP web applications—including SQL injection, XSS, CSRF, insecure file uploads, remote code execution, weak password storage, and session hijacking—and provides practical mitigation techniques for each.

CSRFFile UploadPHP
0 likes · 6 min read
Common Security Vulnerabilities in PHP Web Applications and How to Prevent Them
Test Development Learning Exchange
Test Development Learning Exchange
Oct 16, 2023 · Information Security

Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures

This article presents practical Python examples for enhancing network security, covering symmetric and asymmetric encryption, hash functions, password hashing, SSL/TLS communication, SQL injection prevention, XSS mitigation, CSRF protection, and secure password storage to safeguard data and privacy.

CSRFEncryptionHashing
0 likes · 7 min read
Python Techniques for Data Protection and Privacy: Encryption, Hashing, SSL/TLS, and Common Security Measures
php中文网 Courses
php中文网 Courses
Aug 6, 2023 · Information Security

Common Web Attack Types and Their Mitigation Strategies

This article outlines the most common web attacks—including DDoS, XSS, SQL injection, and CSRF—explains how they compromise website security, and provides practical mitigation techniques such as traffic filtering, input validation, parameterized queries, CSRF tokens, and secure configuration to protect sites and user data.

CSRFDDoSMitigation
0 likes · 10 min read
Common Web Attack Types and Their Mitigation Strategies
php中文网 Courses
php中文网 Courses
May 20, 2023 · Information Security

Three Methods to Prevent CSRF Attacks in PHP Applications

This article explains three practical techniques—CSRF token validation, read‑only cookie verification, and duplicate‑submission prevention—illustrated with complete PHP code examples, to help developers protect their web applications from cross‑site request forgery attacks.

CSRFWeb Securityduplicate submission
0 likes · 6 min read
Three Methods to Prevent CSRF Attacks in PHP Applications
Laravel Tech Community
Laravel Tech Community
Nov 3, 2022 · Information Security

Cross-Site Request Forgery Vulnerability in WordPress Zephyr Project Manager Plugin (CVE-2022-2839)

The Zephyr Project Manager plugin for WordPress versions prior to 3.2.55 suffers from an unauthenticated CSRF flaw that allows attackers to impersonate administrators and execute malicious actions, including stored XSS, due to missing authorization checks and insufficient input sanitization.

CSRFCVE-2022-2839WordPress
0 likes · 2 min read
Cross-Site Request Forgery Vulnerability in WordPress Zephyr Project Manager Plugin (CVE-2022-2839)
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Aug 19, 2022 · Information Security

Mastering CSRF Protection in Spring Security with In‑Memory Users

This tutorial walks through configuring Spring Security 5.4 on Spring Boot 2.4, demonstrating how to set up in‑memory user credentials, handle CSRF tokens during GET and POST requests, and customize the security filter chain to enable or disable CSRF protection.

CSRFIn-Memory AuthenticationJava
0 likes · 6 min read
Mastering CSRF Protection in Spring Security with In‑Memory Users
IT Services Circle
IT Services Circle
Jun 23, 2022 · Information Security

Comprehensive Guide to JWT Authentication: Concepts, Advantages, Security Issues, and Solutions

This article provides an in‑depth overview of JSON Web Tokens (JWT), explaining their structure, authentication workflow, advantages such as statelessness and CSRF protection, drawbacks like revocation difficulty, and presents practical solutions including blacklist, secret rotation, short‑lived tokens and refresh‑token strategies.

AuthenticationBackendCSRF
0 likes · 13 min read
Comprehensive Guide to JWT Authentication: Concepts, Advantages, Security Issues, and Solutions
YunZhu Net Technology Team
YunZhu Net Technology Team
Mar 24, 2022 · Information Security

Understanding XSS, CSRF, and Clickjacking: Attack Mechanisms and Defense Measures

This article explains the principles, attack vectors, and mitigation techniques for three common web security threats—Cross‑Site Scripting (XSS), Cross‑Site Request Forgery (CSRF), and Clickjacking—detailing how malicious scripts are injected, how forged requests exploit user credentials, and how defensive headers, token strategies, and frame restrictions can protect applications.

CSRFClickjackingContent Security Policy
0 likes · 14 min read
Understanding XSS, CSRF, and Clickjacking: Attack Mechanisms and Defense Measures
Top Architect
Top Architect
Jan 18, 2022 · Information Security

Comprehensive Spring Security Guide: Authentication, Authorization, Custom Configurations, and CSRF Protection

This article provides an in‑depth tutorial on Spring Security, covering its core concepts, authentication flow, project setup, dependency imports, custom UserDetailsService, password encoding, login handling, role‑based access control, CSRF protection, and integration with Thymeleaf, complete with practical code examples.

AuthenticationCSRFJava
0 likes · 16 min read
Comprehensive Spring Security Guide: Authentication, Authorization, Custom Configurations, and CSRF Protection