How to use Flask-WTForms CSRF protection with AJAX?
Asked Answered
G

2

18

Flask-WTForms provides CSRF protection. It works great when using normal HTML forms, but the process is less clear when using AJAX. I have a file upload in my form, and I split the process in two with AJAX: the file goes to the upload endpoint while the rest of the form goes to the submit endpoint. Since the file is posted with AJAX, it doesn't get a CSRF token, but I want to protect the upload endpoint from attacks. How can I generate a CSRF token when using AJAX?

@app.route('/submit', methods=["GET","POST"])
@login_required
def submit():
    form = MyForm()

    if request.method == "POST" and form.validate():
        # success, csrf checks out and data is validated
        # do stuff

    csrf_for_uploads = # generate csrf?
    return render_template('some_form.html', form=form, csrf_for_uploads=csrf_for_uploads)

@app.route('/upload', methods=["POST"])
@login_required
def upload():
    myfile = request.files['file']
    # How do I verify CSRF now?
Great answered 8/8, 2015 at 0:15 Comment(0)
A
28

The documentation speaks a bit about implementing CSRF protection with regards to AJAX.

You can enable the module:

from flask_wtf.csrf import CsrfProtect

CsrfProtect(app)

and then use this in your AJAX POST call:

<meta name="csrf-token" content="{{ csrf_token() }}">

var csrftoken = $('meta[name=csrf-token]').attr('content')

$.ajaxSetup({
    beforeSend: function(xhr, settings) {
        if (!/^(GET|HEAD|OPTIONS|TRACE)$/i.test(settings.type) && !this.crossDomain) {
            xhr.setRequestHeader("X-CSRFToken", csrftoken)
        }
    }
})

Hope this helps!

Adina answered 8/8, 2015 at 1:57 Comment(6)
Hm, I completely missed that documentation. Yeah, that pretty much sums it up.Great
Hi please note: "FlaskWTFDeprecationWarning: "flask_wtf.CsrfProtect" has been renamed to "CSRFProtect" and will be removed in 1.0."Montagu
May someone explain what "if (!/^(GET|HEAD|OPTIONS|TRACE)$/i.test(settings.type) && !this.crossDomain) " means? thanks!Montagu
@Montagu if settings.type doesn't start with GET or HEAD ... and it's not a cross-domain request.Berlyn
this solution relies on rendering a template with jinja. is there a way to do it without? such as passing the token in the response?Violent
how to do this using fetch API?Gory
G
0

Im thinking !/^ is a negative assertion so if the request is not matching Get/Head etc and not cross domain, then set request header with the value of the csrf token

Granulation answered 3/7, 2021 at 10:46 Comment(0)

© 2022 - 2024 — McMap. All rights reserved.