Bug 46527 - Error popup after inactivity: Cross Site Request Forgery attack detected.
Error popup after inactivity: Cross Site Request Forgery attack detected.
Status: REOPENED
Product: UCS
Classification: Unclassified
Component: UMC (Generic)
UCS 4.4
Other Linux
: P5 normal (vote)
: ---
Assigned To: UMC maintainers
UMC maintainers
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-03-07 12:49 CET by Arvid Requate
Modified: 2021-09-13 17:30 CEST (History)
6 users (show)

See Also:
What kind of report is it?: Bug Report
What type of bug is this?: 4: Minor Usability: Impairs usability in secondary scenarios
Who will be affected by this bug?: 3: Will affect average number of installed domains
How will those affected feel about the bug?: 2: A Pain – users won’t like this once they notice it
User Pain: 0.137
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Arvid Requate univentionstaff 2018-03-07 12:49:59 CET
During product tests I had to leave my open UMC web Administrator session for a while and when I came back and clicked on the users module to open it (DHCP and policies modules where still open), I received this error popup:

=============================================================================
An error occurred

You are not authorized to perform this action.

Server error message:

Cross Site Request Forgery attack detected. Please provide the "UMCSessionId" cookie value as HTTP request header "X-Xsrf-Protection".
=============================================================================
Comment 1 Arvid Requate univentionstaff 2018-03-07 12:52:13 CET
Browser: Firefox 58.0.2 (64-bit).
Comment 2 Sönke Schwardt-Krummrich univentionstaff 2018-03-08 17:05:12 CET
Same browser; UCS 4.3-0; DC master; same error message but I clicked on the users/user module
Comment 3 Johannes Keiser univentionstaff 2018-05-17 11:24:44 CEST
This was reported due to Bug #46319 23 times.
Comment 4 Jürn Brodersen univentionstaff 2019-01-10 10:29:05 CET
I saw this with chrome while having the network tab open. X-XSRF-Protection was in fact not the same as the sessionId in the cookie for that request.

Interestingly I couldn't find any response header that set a cookie with the sessionId that was sent as X-XSRF-Protection in the failed request?

Anyway a retry instead of an error would be nice.
Comment 5 Ingo Steuwer univentionstaff 2021-05-14 15:42:53 CEST
This issue has been filed against UCS 4.3.

UCS 4.3 is out of maintenance and many UCS components have changed in later releases. Thus, this issue is now being closed.

If this issue still occurs in newer UCS versions, please use "Clone this bug" or reopen it and update the UCS version. In this case please provide detailed information on how this issue is affecting you.
Comment 6 Sönke Schwardt-Krummrich univentionstaff 2021-09-13 17:23:10 CEST
Reopen → happened again at a school customer
Comment 7 Florian Best univentionstaff 2021-09-13 17:30:40 CEST
(In reply to Sönke Schwardt-Krummrich from comment #6)
> Reopen → happened again at a school customer
Which UCS version?