Cross request site forgery is an unsolved problem

This commit is contained in:
I-Al-Istannen 2024-11-05 18:10:48 +01:00
parent ec80e7ba35
commit 5c4051d600

View file

@ -60,8 +60,8 @@ class ShibbolethLogin:
"j_username": username, "j_username": username,
"j_password": password, "j_password": password,
} }
if crsf_token_input := form.find("input", {"name": "csrf_token"}): if csrf_token_input := form.find("input", {"name": "csrf_token"}):
data["csrf_token"] = crsf_token_input["value"] data["csrf_token"] = csrf_token_input["value"]
soup = await _post(sess, url, data) soup = await _post(sess, url, data)
if soup.find(id="attributeRelease"): if soup.find(id="attributeRelease"):
@ -108,8 +108,8 @@ class ShibbolethLogin:
"_eventId_proceed": "", "_eventId_proceed": "",
"j_tokenNumber": tfa_token, "j_tokenNumber": tfa_token,
} }
if crsf_token_input := form.find("input", {"name": "csrf_token"}): if csrf_token_input := form.find("input", {"name": "csrf_token"}):
data["crsf_token"] = crsf_token_input["value"] data["csrf_token"] = csrf_token_input["value"]
return await _post(session, url, data) return await _post(session, url, data)
@staticmethod @staticmethod