Blog

CSRF Security Module: Not All Surfing Is Good

Nathaniel Francis February 20, 2015

Spread the word

Nathaniel Francis

February 20, 2015

Spread the word


Share your thoughts

Welcome to the jungle

Remember a time when the internet was a safe place. Where your email wasn't getting hacked every 3 months, nobody wanted to XSS something malicious to you or through you, and no one conceived of encrypting your hard drive for money?

I don't either. Since its inception, the internet has been a jungle of security complications.

CSRF: not the good kind of surfing

This discussion could quickly dive into a host of security complications and safety precautions that we, as developers should be paying attention to. Instead, I'm going to focus on one security breach and a modular technique that ColdBox 4.0 provides to help us developers fight against it.

CSRF aka "Cross-Site Request Forgery", commonly pronounced "sea-surf", is a web exploitation where the offender violates the trust between a website and a user's browser. I know that's vague. There are various forms that CSRF takes, but they all boil down to the website being violated by the user's browser in some way, shape, or form. This is just the basic idea. The whole story is worth a decent Google search.

We got a module for that!

As with any multi-faceted security aspect, there is no singular answer. If a burglar can come into your house through either the window or the door, you may want to shut and lock both, or get a guard dog, or move. However, with CSRF security violations, there is one common flaw. The violation of trust comes from triggering actions on your site without your consent. That we can handle.

The ColdBox Cross Site Request Forgery (CSRF) Tokens module generates tokens that generate a verification, "secret handshake" system between your server and the browser. This added layer of security is subtle, but powerful in CSRF violations because it prevents a foreign agent from violating the trust between browser and server.

To install the ColdBox Cross Site Request Forgery (CSRF) Tokens module, simply go to CommandBox and enter:

box install cbcsrf

The ReadMe for this module includes the following simple example of how to use the CSRF module's functionality:

component {
    any function signUp(event, rc, prc) {
        // Store this in a hidden field in the form
        prc.token = generateCSRFToken();
    }

    any function signUpProcess(event, rc, prc) {
        // Verify CSFR token from form
        if(verifyCSRFToken(rc.token) {
            // save form
        } else {
            // Something isn't right
            setNextEvent( 'handler.signup' );
        }
    }
}

The ColdBox Cross Site Request Forgery (CSRF) Tokens module is a simple, elegant solution to a common security problem.

Add Your Comment

Recent Entries

Ortus Monthly Free Webinar – June Edition! 💥

Ortus Monthly Free Webinar – June Edition! 💥

Join us for the June edition of our Ortus Monthly Free Webinar Series, where we explore the power of serverless development using BoxLang and AWS Lambda. Led by Luis Majano, the creator of BoxLang and CEO of Ortus Solutions.

Date: June 18th, 2025 - 11:00 AM (CDT)

  • Location: Online
  • Speaker: Luis Majano

Maria Jose Herrera
Maria Jose Herrera
May 16, 2025
CFCasts, Elevated Experience, Discover What’s New! 🚀

CFCasts, Elevated Experience, Discover What’s New! 🚀

We’re beyond thrilled to unveil the completely redesigned CFCasts platform — a fresh new look, a smarter learning experience, and powerful new features that will take your web development journey to the next level.

Maria Jose Herrera
Maria Jose Herrera
May 15, 2025
Into the Box 2025 – Keynote Day 1 Recap

Into the Box 2025 – Keynote Day 1 Recap

Into the Box 2025 kicked off in the best way possible with an exciting keynote from Luis Majano, CEO of Ortus Solutions. He welcomed everyone to the 14th edition of the conference and shared some exciting news: BoxLang 1.0 is officially here!

Maria Jose Herrera
Maria Jose Herrera
May 14, 2025