Skip to content

Commit 8465295

Browse files
mkhanasnickchomey
andauthored
Update cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.md
Co-authored-by: nickchomey <88559987+nickchomey@users.noreply.github.com>
1 parent a4e6e73 commit 8465295

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ In short, the following principles should be followed to defend against CSRF:
1515
- **See the OWASP [XSS Prevention Cheat Sheet](Cross_Site_Scripting_Prevention_Cheat_Sheet.md) for detailed guidance on how to prevent XSS flaws.**
1616
- **First, check if your framework has [built-in CSRF protection](#use-built-in-or-existing-csrf-implementations-for-csrf-protection) and use it**
1717
- **If the framework does not have built-in CSRF protection, add [CSRF tokens](#token-based-mitigation) to all state-changing requests (requests that cause actions on the site) and validate them on the backend.**
18-
- **If your software is intended to be used only on modern browsers, you may rely on [Fetch Metadata headers](#fetch-metadata-headers) to block cross-site state-changing requests, so long as you use the fallback options detailed below.**
18+
- **If your software targets only modern browsers, you may rely on [Fetch Metadata headers](#fetch-metadata-headers) together with the fallback options described below to block cross-site state-changing requests.**
1919
- **Stateful software should use the [synchronizer token pattern](#synchronizer-token-pattern)**
2020
- **Stateless software should use [double submit cookies](#alternative-using-a-double-submit-cookie-pattern)**
2121
- **If an API-driven site can't use `<form>` tags, consider [using custom request headers](#employing-custom-request-headers-for-ajaxapi)**

0 commit comments

Comments
 (0)