nextcloud/apps/dav
Louis Chemineau 7a0261878a fix: Move CSRF check from base to PublicAuth for public.php
This currently prevent directly accessing a ressource when clicking on a link on a third party site. Example, clicking on `https://example.com/public.php/dav/files/pqLWcA269zfzXez/?accept=zip` in a GitHub comment.

Skipping the check is an issue with password protected shares, as it allows third party sites to request the ressource when the user already entered the password, aka CSRF.  So after removing the check from `base.php`, we need to add the it again in the `PublicAuth` plugin.

We also add a redirect to be helpful to the user.

**Warning**: this adds the limitation that clicking on a direct download link for password protected shares will redirect you to the password form, and then to the main share view.

Fix #52482

Signed-off-by: Louis Chemineau <louis@chmn.me>
2025-05-22 08:30:36 +00:00
..
appinfo fix: Move CSRF check from base to PublicAuth for public.php 2025-05-22 08:30:36 +00:00
composer fix(caldav): prevent unshare entry creation for owner unsharing 2025-05-19 14:35:04 +02:00
css feat: Add bidi support in core directory 2024-08-29 08:32:47 +00:00
img chore: Add SPDX header 2024-05-28 14:41:28 +02:00
l10n fix(l10n): Update translations from Transifex 2025-05-22 00:22:50 +00:00
lib fix: Move CSRF check from base to PublicAuth for public.php 2025-05-22 08:30:36 +00:00
src test: update snapshots 2025-04-22 12:32:53 +02:00
templates chore: Add SPDX header 2024-05-28 14:41:28 +02:00
tests fix: Move CSRF check from base to PublicAuth for public.php 2025-05-22 08:30:36 +00:00
.gitignore chore: Add SPDX header 2024-05-28 14:41:28 +02:00
.l10nignore chore: Add SPDX header 2024-05-28 14:41:28 +02:00
openapi.json fix(dav): Use IUser::getDisplayName directly 2025-03-05 13:05:47 +00:00
openapi.json.license chore: Add SPDX header 2024-05-28 14:41:28 +02:00