CSRF Protection

HTML Dialogs using the JSF technology are well protected from Cross-site Request Forgery (CSRF) attacks:

  • Since version 2.0, JSF is quite well protected from CSRF attacks by its ViewState concept, using a randomly generated ID as its value.

  • Postback views are automatically protected; non-postback views need to be configured to be protected, but are not a valid attack scenario.

  • Since JSF 2.2, even non-postback views, stateless views, and views with client side state can be or are protected by default.

Note

Since the JSF ViewState concept is not based on the usual X-CSRF header token schema, some penetration testing tools will show a false vulnerability for CSRF attacks. They expect a header token in the server response, which is not needed in this case and, if included, will be ignored by the Axon Ivy Engine.