Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Drupal 8 Module Development

You're reading from   Drupal 8 Module Development Build and customize Drupal 8 modules and extensions efficiently

Arrow left icon
Product type Paperback
Published in Oct 2017
Publisher Packt
ISBN-13 9781782168775
Length 566 pages
Edition 1st Edition
Languages
Tools
Concepts
Arrow right icon
Author (1):
Arrow left icon
Daniel Sipos Daniel Sipos
Author Profile Icon Daniel Sipos
Daniel Sipos
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Developing for Drupal 8 FREE CHAPTER 2. Creating Your First Module 3. Logging and Mailing 4. Theming 5. Menus and Menu Links 6. Data Modeling and Storage 7. Your Own Custom Entity and Plugin Types 8. The Database API 9. Custom Fields 10. Access Control 11. Caching 12. JavaScript and the Ajax API 13. Internationalization and Languages 14. Batches, Queues, and Cron 15. Views 16. Working with Files and Images 17. Automated Testing 18. Drupal 8 Security

Cross-Site Request Forgery (CSRF)

CSRF attacks are another popular way applications can be overtaken, by forcing a user with elevated privileges to execute unwanted actions on their own site. Usually, this happens when certain URLs on the application trigger a process simply by being accessed through the browser (and being authenticated)--for example, deleting a resource.

The most important thing to consider in this respect is to never have such actions happening simply by accessing a URL. To help with this, we have the powerful Form API, which already had token-based CSRF protection embedded from previous versions of Drupal. So basically you can create forms whose submit handlers perform the potentially damaging actions (as we learned in Chapter 2, Creating Your First Module) or even add a second layer using a confirmation form (as we saw in Chapter 6, Data Modeling and Storage...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at ₹800/month. Cancel anytime