CSRF Protection

Html Dialogs using the JSF technology are well protected from Cross-site Request Forgery (CSRF) attacks:

  • JSF is since version 2.0 quite well protected from CSRF attacks through its ViewState concept, using a randomly generated ID as its value.

  • Since JSF 2.2 even non-postback views, stateless views and views with client side state can be or are protected by default.

  • Postback views are automatically protected; non-postback views need to be configured to be protected, but are not a valid attack scenario.

Note

As the the JSF ViewState concept does not base on the usual X-CSRF header token schema, some penetration testing tools will show a false vulnerability for CSRF attacks. They expect a header token in the server response, which is not needed in this case and, if included, will be ignored by the Ivy Engine.