The Common network requests, also termed as HTTP requests include GET and POST.
A GET request is simply a request for a page from a server, e.g. visiting google.com.
If we never used or needed dynamic applications, We'll all be safe and at-least one vulnerability down, when we interact and use web products and applications.
How? In simple words, any application that allows a user to send or update data is potentially a target for an attacker or malicious user. The following is a list of potential uses for Cross site resource forgery (CSRF):
- Transfer money from one bank account to another.
- Use content management systems to access and modify user data
- Change a user’s password.
- Add items to a user’s shopping cart.
- Change the delivery address of an order.
- Post a tweet on a user's account. E.T.C
Thus, from a developers point of view implementing CSRF tokens on all types of form data sent to the server, is fundamental to the applications security.
So When do i use CSRF protection ?
Formula: No cookies = No CSRF
Because HTTP is a stateless protocol, in which no session information is retained by the receiver it cannot internally distinguish one user from another. By using cookies, servers instruct browsers to save a unique key or session data and then send it back with each request made to the server.
When a network request is sent from a browser to a server, the browser checks if it has a stored cookie that belongs to that server. While carrying out this process, it checks to see whether the properties and flags of the cookies (domain, path, secure), match the website's data which has been requested. If they match, the browser sends the relevant cookies along with the request.
If all you want to know is "Do I need CSRF protection for my API routes?" you can stop right here and leave with your answer 😀. You've got your answer!
Personally for my applications i use JWT for my Authentication on my API routes.