How can I detect if my php script is being called from another domain and the other domain is making illegal use of my script? Is there a way to prevent this too?
UPDATE
I found this question on SO, but its still not safe, it can be spoofed.
How can I detect if my php script is being called from another domain and the other domain is making illegal use of my script? Is there a way to prevent this too?
UPDATE
I found this question on SO, but its still not safe, it can be spoofed.
I know this is an old post but currently THERE IS a "foolproof" method to avoid this and its as simple as hell... First in the page where the ajax call will be made:
Then in the ajax script
And finally in the php page that will be called:
You can manually deny every request whose
Origin
header does not match your domain name. However, not all browsers send theOrigin
header. In these cases, you can fallback to theReferer
[sic] header, parse it and find out the domain name, and compare it as above.Some JavaScript frameworks also set an
X-Requested-With
header for AJAX requests.This should reject a significant percentage of users (I'd estimate >95%). Note that due to the Same-Origin Policy, the only thing the guy sending AJAX requests to your domain gets is timing information anyway.
This isn't a problem that can be solved. If you create a website you make it, by definition, openly available.
If you want your data to be private, you need to require some sort of login.
It is impossible to create a system that is open to users but not to scripts without login/annoying captchas.
A bit like user3491125 proposed, you could set a $_SESSION in the page where the call is made and check it on the page Ajax called if there is for instance $_SESSION['user'] set.
There isn't any absolutely foolproof method to prevent this, since any header information can be spoofed. Session-based tokens are another possible solution, but in that case your javascript is publicly accessible, so anyone who wanted to spend a little time could determine how your token system works and figure out a way around it.
A combination of methods will give you the most wide-ranging protection. You can look for the header, use and .htaccess file, and use tokens. This sort of all-of-the-above approach makes it that much harder to abuse a web server - most abuse comes from people trying to find an easy hole to exploit. The important thing to remember is that you can't become complacent because you've deployed "the best" protection, or because you've got so many layers of protection that it seems impossible to crack. If someone really wanted it bad enough and had the time, they'll find a way. These types of preventative measures are really only deterrents to keep away the lazy, curious, and idly malicious. Targeted attacks are a whole separate class of security, and usually are more centered on server-level security issues.
Sample htaccess. This would not be something you'd put in your root, but rather within a subfolder where you have scripts that should never be called from the address bar:
Check out this article for info about using a token system: https://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29_Prevention_Cheat_Sheet