From 5c4051d600ec0a08b31f48d0495debb0ba3bdab0 Mon Sep 17 00:00:00 2001 From: I-Al-Istannen Date: Tue, 5 Nov 2024 18:10:48 +0100 Subject: [PATCH] Cross request site forgery is an unsolved problem --- PFERD/crawl/ilias/shibboleth_login.py | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/PFERD/crawl/ilias/shibboleth_login.py b/PFERD/crawl/ilias/shibboleth_login.py index fbced2b..d57820e 100644 --- a/PFERD/crawl/ilias/shibboleth_login.py +++ b/PFERD/crawl/ilias/shibboleth_login.py @@ -60,8 +60,8 @@ class ShibbolethLogin: "j_username": username, "j_password": password, } - if crsf_token_input := form.find("input", {"name": "csrf_token"}): - data["csrf_token"] = crsf_token_input["value"] + if csrf_token_input := form.find("input", {"name": "csrf_token"}): + data["csrf_token"] = csrf_token_input["value"] soup = await _post(sess, url, data) if soup.find(id="attributeRelease"): @@ -108,8 +108,8 @@ class ShibbolethLogin: "_eventId_proceed": "", "j_tokenNumber": tfa_token, } - if crsf_token_input := form.find("input", {"name": "csrf_token"}): - data["crsf_token"] = crsf_token_input["value"] + if csrf_token_input := form.find("input", {"name": "csrf_token"}): + data["csrf_token"] = csrf_token_input["value"] return await _post(session, url, data) @staticmethod