<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Community 7.0: Possible CSRF attack noted when asserting referer header in Alfresco Forum</title>
    <link>https://connect.hyland.com/t5/alfresco-forum/community-7-0-possible-csrf-attack-noted-when-asserting-referer/m-p/138704#M37135</link>
    <description>&lt;P&gt;I tried setting "csrf.filter.enabled=false" in my global properties file with no success so I tried my best to add the needed settings to make it work but that also was unsuccessful.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My Environment is Community7 behind HAPROXY which then forwards the https traffic to NGINX which then forwards that to community7 on my private network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;host1= HAPROXY:&amp;nbsp; &amp;nbsp;&lt;A href="https://alfresco.domain.com" target="_blank" rel="noopener nofollow noreferrer"&gt;https://alfresco.domain.com&lt;/A&gt;&lt;BR /&gt;host2= NGINX:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;A href="https://alfresco.dmz.domain.com" target="_blank" rel="noopener nofollow noreferrer"&gt;https://alfresco.dmz.domain.com&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;host2= ALFRESCO&amp;nbsp; &lt;A href="http://127.0.0.1:8080/share" target="_blank" rel="noopener nofollow noreferrer"&gt;http://127.0.0.1:8080/share&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I have csrf.filter(s) set in my properties file&lt;/P&gt;&lt;P&gt;/etc/opt/alfresco/content-services/classpath/alfresco-global.properties:&lt;/P&gt;&lt;PRE&gt;...&lt;BR /&gt;# CSRF filter overrides
csrf.filter.enabled=enabled
csrf.filter.referer=https://alfresco.dmz.domain.com/.*
csrf.filter.referer.always=false
csrf.filter.origin=https://alfresco.dmz.domain.com
csrf.filter.origin.always=false&lt;BR /&gt;...&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;HOWEVER,&amp;nbsp; I'm not familiar share-config-custom.xml syntax or positioning the CSRF settings in the correct location of the xml code.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;This is what I have uncommented out but I still see CSRF errors in my share.log...&lt;/P&gt;&lt;P&gt;/etc/opt/alfresco/content-services/classpath/alfresco/web-extension/share-config-custom.xml:&lt;/P&gt;&lt;PRE&gt;...&lt;BR /&gt;&lt;BR /&gt;   &amp;lt;!--
      CSRF filter config to mitigate CSRF/Seasurfing/XSRF attacks
      To disable the CSRF filter override the &amp;lt;filter&amp;gt; to not contain any values, see share-config-custom.xml for
      an example.
      If you have a custom resource(s) that a client POST to that can't accept a token, for whatever reason, then make
      sure to copy the entire CSRFPolicy config and place it in your share-config-custom.xml file
      with the replace="true" attribute and make sure to add a new &amp;lt;rule&amp;gt; in the top of the &amp;lt;filter&amp;gt; element,
      which has a &amp;lt;request&amp;gt; element matching your requests, and uses only the "assertReferer" &amp;amp; "assertOrigin" actions.
      I.e.&lt;BR /&gt;   --&amp;gt;
      &amp;lt;rule&amp;gt;
         &amp;lt;request&amp;gt;
            &amp;lt;method&amp;gt;POST&amp;lt;/method&amp;gt;
            &amp;lt;path&amp;gt;/proxy/alfresco/custom/repoWebscript/withoutParams|/service/custom/shareResource/thatMayHaveParams(\?.+)?&amp;lt;/path&amp;gt;
         &amp;lt;/request&amp;gt;
         &amp;lt;action name="assertReferer"&amp;gt;
            &amp;lt;param name="referer"&amp;gt;{referer}&amp;lt;/param&amp;gt;
         &amp;lt;/action&amp;gt;
         &amp;lt;action name="assertOrigin"&amp;gt;
            &amp;lt;param name="origin"&amp;gt;{origin}&amp;lt;/param&amp;gt;
         &amp;lt;/action&amp;gt;
      &amp;lt;/rule&amp;gt;

   &amp;lt;config evaluator="string-compare" condition="CSRFPolicy" replace="true"&amp;gt;

      &amp;lt;!--
         Properties that may be used inside the rest of the CSRFPolicy config to avoid repetition but
         also making it possible to provide different values in different environments.
         I.e. Different "Referer" &amp;amp; "Origin" properties for test &amp;amp; production etc.
         Reference a property using "{propertyName}".
      --&amp;gt;
      &amp;lt;properties&amp;gt;

         &amp;lt;!-- There is normally no need to override this property --&amp;gt;
         &amp;lt;token&amp;gt;Alfresco-CSRFToken&amp;lt;/token&amp;gt;

         &amp;lt;!--
            Override and set this property with a regexp that if you have placed Share behind a proxy that
            does not rewrite the Referer header.
         --&amp;gt;

         &amp;lt;referer&amp;gt;alfresco.dmz.domain.com&amp;lt;/referer&amp;gt;

         &amp;lt;!--
            Override and set this property with a regexp that if you have placed Share behind a proxy that
            does not rewrite the Origin header.
         --&amp;gt;
         &amp;lt;origin&amp;gt;alfresco.dmz.domain.com&amp;lt;/origin&amp;gt;
      &amp;lt;/properties&amp;gt;

      &amp;lt;!--
        Will be used and exposed to the client side code in Alfresco.contants.CSRF_POLICY.
        Use the Alfresco.util.CSRFPolicy.getHeader() or Alfresco.util.CSRFPolicy.getParameter() with Alfresco.util.CSRFPolicy.getToken()
        to set the token in custom 3rd party code.
      --&amp;gt;
      &amp;lt;client&amp;gt;
         &amp;lt;cookie&amp;gt;{token}&amp;lt;/cookie&amp;gt;
         &amp;lt;header&amp;gt;{token}&amp;lt;/header&amp;gt;
         &amp;lt;parameter&amp;gt;{token}&amp;lt;/parameter&amp;gt;
      &amp;lt;/client&amp;gt;&lt;BR /&gt;&lt;BR /&gt;...&lt;/PRE&gt;</description>
    <pubDate>Tue, 22 Jun 2021 16:48:59 GMT</pubDate>
    <dc:creator>michaelzietlow</dc:creator>
    <dc:date>2021-06-22T16:48:59Z</dc:date>
    <item>
      <title>Community 7.0: Possible CSRF attack noted when asserting referer header</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/community-7-0-possible-csrf-attack-noted-when-asserting-referer/m-p/138702#M37133</link>
      <description>&lt;P&gt;I have a fresh community7.0 installation via zip distribution and ansible.&lt;BR /&gt;W&lt;SPAN&gt;hen enable SSL in /etc/nginx/conf.d/, the alfresco orange login page loads securely (https),&amp;nbsp; but when I attempt to authenticate,&amp;nbsp; I see the following CSRF errors in alfresco.log.&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt; 2021-06-21 15:01:47,561  ERROR [alfresco.web.site] [http-nio-8080-exec-10] javax.servlet.ServletException: Possible CSRF attack noted when asserting referer header 'https://alfresco.domain.com/share/page/'. Request: POST /share/page/dologin, FAILED TEST: Assert referer POST /share/page/dologin :: referer: 'https://alfresco.domain.com/share/page/' vs server &amp;amp; context: http://127.0.0.1:8080/ (string) or  (regexp)&lt;/PRE&gt;&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;Is this something I need to fix in nginx config, alfresco.properties, or web-extension xml?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;/etc/nginx/conf.d/alfresco.conf:&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;server {
    access_log  /var/log/alfresco/access.log;
    error_log /var/log/alfresco/error.log error;

        listen 443 ssl;
        listen [::]:443 ssl;&lt;BR /&gt;        server_name alfresco.domain.com;
        ssl_certificate          /etc/certs/server.crt;
        ssl_certificate_key  /etc/certs/server.key;
        ssl_session_cache shared:SSL:1m;
        ssl_session_timeout  5m;
      
        client_max_body_size 0;
        set  $allowOriginSite *;
        proxy_pass_request_headers on;
        proxy_pass_header Set-Cookie;

        # Protect access to SOLR APIs
        location ~ ^(/.*/service/api/solr/.*)$ {return 403;}
        location ~ ^(/.*/s/api/solr/.*)$ {return 403;}
        location ~ ^(/.*/wcservice/api/solr/.*)$ {return 403;}
        location ~ ^(/.*/wcs/api/solr/.*)$ {return 403;}

        location ~ ^(/.*/proxy/.*/api/solr/.*)$ {return 403 ;}
        location ~ ^(/.*/-default-/proxy/.*/api/.*)$ {return 403;}

        # Protect access to Prometheus endpoint
        location ~ ^(/.*/s/prometheus)$ {return 403;}

        location / {
            proxy_pass http://127.0.0.1:8080;
            proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
            proxy_pass_header Set-Cookie;
            proxy_set_header X-Forwarded-Proto https;
        }

        # External settings, do not remove
        #ENV_ACCESS_LOG

        location /share/ {
            proxy_pass http://127.0.0.1:8080;
            proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
            proxy_pass_header Set-Cookie;
            proxy_set_header X-Forwarded-Proto https;
        }

        location /alfresco/ {
            proxy_pass http://127.0.0.1:8080;
            proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
            proxy_pass_header Set-Cookie;
            proxy_set_header X-Forwarded-Proto https;
        }

        location /api-explorer/ {
            proxy_pass http://127.0.0.1:8080;
            proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
            proxy_pass_header Set-Cookie;
            proxy_set_header X-Forwarded-Proto https;
        }
    }&lt;/PRE&gt;</description>
      <pubDate>Tue, 22 Jun 2021 00:05:32 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/community-7-0-possible-csrf-attack-noted-when-asserting-referer/m-p/138702#M37133</guid>
      <dc:creator>michaelzietlow</dc:creator>
      <dc:date>2021-06-22T00:05:32Z</dc:date>
    </item>
    <item>
      <title>Re: Community 7.0: Possible CSRF attack noted when asserting referer header</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/community-7-0-possible-csrf-attack-noted-when-asserting-referer/m-p/138703#M37134</link>
      <description>&lt;P&gt;This has not much do to with your nginx config. Rather your CSRF configuration in Alfresco is incomplete, missing the CSRF referrer / origin patterns for your public URL. In Share this is done via the share-config-custom.xml by setting the &lt;A href="https://github.com/Alfresco/share/blob/master/share/src/main/resources/alfresco/share-security-config.xml#L77" target="_self" rel="nofollow noopener noreferrer"&gt;CSRFPolicy's origin/referrer&lt;/A&gt; sub-elements. In ACS Repository, this is done via alfresco-global.properties by setting the &lt;A href="https://github.com/Alfresco/alfresco-community-repo/blob/main/repository/src/main/resources/alfresco/repository.properties#L1173" target="_self" rel="nofollow noopener noreferrer"&gt;appropriate referrer/origin properties&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 08:00:16 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/community-7-0-possible-csrf-attack-noted-when-asserting-referer/m-p/138703#M37134</guid>
      <dc:creator>afaust</dc:creator>
      <dc:date>2021-06-22T08:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: Community 7.0: Possible CSRF attack noted when asserting referer header</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/community-7-0-possible-csrf-attack-noted-when-asserting-referer/m-p/138704#M37135</link>
      <description>&lt;P&gt;I tried setting "csrf.filter.enabled=false" in my global properties file with no success so I tried my best to add the needed settings to make it work but that also was unsuccessful.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My Environment is Community7 behind HAPROXY which then forwards the https traffic to NGINX which then forwards that to community7 on my private network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;host1= HAPROXY:&amp;nbsp; &amp;nbsp;&lt;A href="https://alfresco.domain.com" target="_blank" rel="noopener nofollow noreferrer"&gt;https://alfresco.domain.com&lt;/A&gt;&lt;BR /&gt;host2= NGINX:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;A href="https://alfresco.dmz.domain.com" target="_blank" rel="noopener nofollow noreferrer"&gt;https://alfresco.dmz.domain.com&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;host2= ALFRESCO&amp;nbsp; &lt;A href="http://127.0.0.1:8080/share" target="_blank" rel="noopener nofollow noreferrer"&gt;http://127.0.0.1:8080/share&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I have csrf.filter(s) set in my properties file&lt;/P&gt;&lt;P&gt;/etc/opt/alfresco/content-services/classpath/alfresco-global.properties:&lt;/P&gt;&lt;PRE&gt;...&lt;BR /&gt;# CSRF filter overrides
csrf.filter.enabled=enabled
csrf.filter.referer=https://alfresco.dmz.domain.com/.*
csrf.filter.referer.always=false
csrf.filter.origin=https://alfresco.dmz.domain.com
csrf.filter.origin.always=false&lt;BR /&gt;...&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;HOWEVER,&amp;nbsp; I'm not familiar share-config-custom.xml syntax or positioning the CSRF settings in the correct location of the xml code.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;This is what I have uncommented out but I still see CSRF errors in my share.log...&lt;/P&gt;&lt;P&gt;/etc/opt/alfresco/content-services/classpath/alfresco/web-extension/share-config-custom.xml:&lt;/P&gt;&lt;PRE&gt;...&lt;BR /&gt;&lt;BR /&gt;   &amp;lt;!--
      CSRF filter config to mitigate CSRF/Seasurfing/XSRF attacks
      To disable the CSRF filter override the &amp;lt;filter&amp;gt; to not contain any values, see share-config-custom.xml for
      an example.
      If you have a custom resource(s) that a client POST to that can't accept a token, for whatever reason, then make
      sure to copy the entire CSRFPolicy config and place it in your share-config-custom.xml file
      with the replace="true" attribute and make sure to add a new &amp;lt;rule&amp;gt; in the top of the &amp;lt;filter&amp;gt; element,
      which has a &amp;lt;request&amp;gt; element matching your requests, and uses only the "assertReferer" &amp;amp; "assertOrigin" actions.
      I.e.&lt;BR /&gt;   --&amp;gt;
      &amp;lt;rule&amp;gt;
         &amp;lt;request&amp;gt;
            &amp;lt;method&amp;gt;POST&amp;lt;/method&amp;gt;
            &amp;lt;path&amp;gt;/proxy/alfresco/custom/repoWebscript/withoutParams|/service/custom/shareResource/thatMayHaveParams(\?.+)?&amp;lt;/path&amp;gt;
         &amp;lt;/request&amp;gt;
         &amp;lt;action name="assertReferer"&amp;gt;
            &amp;lt;param name="referer"&amp;gt;{referer}&amp;lt;/param&amp;gt;
         &amp;lt;/action&amp;gt;
         &amp;lt;action name="assertOrigin"&amp;gt;
            &amp;lt;param name="origin"&amp;gt;{origin}&amp;lt;/param&amp;gt;
         &amp;lt;/action&amp;gt;
      &amp;lt;/rule&amp;gt;

   &amp;lt;config evaluator="string-compare" condition="CSRFPolicy" replace="true"&amp;gt;

      &amp;lt;!--
         Properties that may be used inside the rest of the CSRFPolicy config to avoid repetition but
         also making it possible to provide different values in different environments.
         I.e. Different "Referer" &amp;amp; "Origin" properties for test &amp;amp; production etc.
         Reference a property using "{propertyName}".
      --&amp;gt;
      &amp;lt;properties&amp;gt;

         &amp;lt;!-- There is normally no need to override this property --&amp;gt;
         &amp;lt;token&amp;gt;Alfresco-CSRFToken&amp;lt;/token&amp;gt;

         &amp;lt;!--
            Override and set this property with a regexp that if you have placed Share behind a proxy that
            does not rewrite the Referer header.
         --&amp;gt;

         &amp;lt;referer&amp;gt;alfresco.dmz.domain.com&amp;lt;/referer&amp;gt;

         &amp;lt;!--
            Override and set this property with a regexp that if you have placed Share behind a proxy that
            does not rewrite the Origin header.
         --&amp;gt;
         &amp;lt;origin&amp;gt;alfresco.dmz.domain.com&amp;lt;/origin&amp;gt;
      &amp;lt;/properties&amp;gt;

      &amp;lt;!--
        Will be used and exposed to the client side code in Alfresco.contants.CSRF_POLICY.
        Use the Alfresco.util.CSRFPolicy.getHeader() or Alfresco.util.CSRFPolicy.getParameter() with Alfresco.util.CSRFPolicy.getToken()
        to set the token in custom 3rd party code.
      --&amp;gt;
      &amp;lt;client&amp;gt;
         &amp;lt;cookie&amp;gt;{token}&amp;lt;/cookie&amp;gt;
         &amp;lt;header&amp;gt;{token}&amp;lt;/header&amp;gt;
         &amp;lt;parameter&amp;gt;{token}&amp;lt;/parameter&amp;gt;
      &amp;lt;/client&amp;gt;&lt;BR /&gt;&lt;BR /&gt;...&lt;/PRE&gt;</description>
      <pubDate>Tue, 22 Jun 2021 16:48:59 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/community-7-0-possible-csrf-attack-noted-when-asserting-referer/m-p/138704#M37135</guid>
      <dc:creator>michaelzietlow</dc:creator>
      <dc:date>2021-06-22T16:48:59Z</dc:date>
    </item>
    <item>
      <title>Re: Community 7.0: Possible CSRF attack noted when asserting referer header</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/community-7-0-possible-csrf-attack-noted-when-asserting-referer/m-p/138705#M37136</link>
      <description>&lt;P&gt;You need to set the public base URL that users will use as the referrer / origin in the CSRF policy section, so if they go through HAProxy, then that would be &lt;A href="https://alfresco.domain.com" target="_blank" rel="noopener nofollow noreferrer"&gt;https://alfresco.domain.com&lt;/A&gt;. Note that technically, referrer and origin are regular expressions, so the technically correct values would be&lt;/P&gt;
&lt;PRE&gt;https://alfresco\.domain\.com(/.*)?&lt;/PRE&gt;
&lt;P&gt;Also note that you do not need to uncomment / use the whole CSRF policy section. It is completely sufficient to use&lt;/P&gt;
&lt;PRE&gt;&amp;lt;config evaluator="string-compare" condition="CSRFPolicy" replace="true"&amp;gt;
    &amp;lt;properties&amp;gt;
        &amp;lt;token&amp;gt;Alfresco-CSRFToken&amp;lt;/token&amp;gt;
        &amp;lt;referer&amp;gt;https://alfresco\.domain\.com(/.*)?&amp;lt;/referer&amp;gt;
        &amp;lt;origin&amp;gt;https://alfresco\.domain\.com(/.*)?&amp;lt;/origin&amp;gt;
    &amp;lt;/properties&amp;gt;
&amp;lt;/config&amp;gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 22 Jun 2021 18:46:50 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/community-7-0-possible-csrf-attack-noted-when-asserting-referer/m-p/138705#M37136</guid>
      <dc:creator>afaust</dc:creator>
      <dc:date>2021-06-22T18:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: Community 7.0: Possible CSRF attack noted when asserting referer header</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/community-7-0-possible-csrf-attack-noted-when-asserting-referer/m-p/138706#M37137</link>
      <description>&lt;P&gt;Much thanks Afaust!&lt;/P&gt;&lt;P&gt;Here is my now working SSL configuration through haproxy, Nginx, and alfresco/content-services!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;/etc/nginx/conf.d/alfresco.conf:&lt;/P&gt;&lt;PRE&gt;...snip...
listen 443 ssl;
listen [::]:443 ssl;
server_name alfresco.domain.com;
ssl_certificate /etc/certs/server.crt;
ssl_certificate_key /etc/certs/server.key;
ssl_session_cache shared:SSL:1m;
ssl_session_timeout 5m;

...snip...

location /share/ {
proxy_pass http://127.0.0.1:8080;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-NginX-Proxy true;
proxy_set_header Host $http_host;
proxy_set_header Upgrade $http_upgrade;
proxy_pass_header Set-Cookie;
proxy_set_header X-Forwarded-Proto https;

}

...snip...&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;/etc/opt/alfresco/content-services/classpath/alfresco-global.properties:&lt;/P&gt;&lt;PRE&gt;...snip...&lt;BR /&gt;&lt;BR /&gt;# CSRF filter overrides&lt;BR /&gt;csrf.filter.enabled=true&lt;BR /&gt;csrf.filter.referer=^https?://alfresco\.domain\.com(/.*)?&lt;BR /&gt;csrf.filter.referer.always=false&lt;BR /&gt;csrf.filter.origin=^https?://alfresco\.domain\.com(/.*)?&lt;BR /&gt;csrf.filter.origin.always=false&lt;BR /&gt;&lt;BR /&gt;...snip...&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;/etc/opt/alfresco/content-services/classpath/alfresco/web-extension/share-config-custom.xml:&lt;/P&gt;&lt;PRE&gt;...snip...&lt;BR /&gt;      &amp;lt;properties&amp;gt;

         &amp;lt;!-- There is normally no need to override this property --&amp;gt;
         &amp;lt;token&amp;gt;Alfresco-CSRFToken&amp;lt;/token&amp;gt;

         &amp;lt;!--
            Override and set this property with a regexp that if you have placed Share behind a proxy that
            does not rewrite the Referer header.
         --&amp;gt;

         &amp;lt;referer&amp;gt;^https?://alfresco\.domain\.com(/.*)?&amp;lt;/referer&amp;gt;

         &amp;lt;!--
            Override and set this property with a regexp that if you have placed Share behind a proxy that
            does not rewrite the Origin header.
         --&amp;gt;
         &amp;lt;origin&amp;gt;^https?://alfresco\.domain\.com(/.*)?&amp;lt;/origin&amp;gt;
      &amp;lt;/properties&amp;gt;&lt;BR /&gt;&lt;BR /&gt;...snip...&lt;/PRE&gt;</description>
      <pubDate>Tue, 22 Jun 2021 19:57:32 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/community-7-0-possible-csrf-attack-noted-when-asserting-referer/m-p/138706#M37137</guid>
      <dc:creator>michaelzietlow</dc:creator>
      <dc:date>2021-06-22T19:57:32Z</dc:date>
    </item>
  </channel>
</rss>

