mirror of
https://github.com/amidaware/tacticalrmm.git
synced 2026-04-26 15:05:57 +03:00
[GH-ISSUE #2282] CSRF token cookie overlap on other subdomain #3358
Labels
No labels
In Process
bug
bug
dev-triage
documentation
duplicate
enhancement
fixed
good first issue
help wanted
integration
invalid
pull-request
question
requires agent update
security
ui tweak
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/tacticalrmm#3358
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Supermanu on GitHub (Aug 28, 2025).
Original GitHub issue: https://github.com/amidaware/tacticalrmm/issues/2282
Server Info (please complete the following information):
Installation Method:
--insecureflag at installAgent Info (please complete the following information):
Describe the bug
We have an other Django application with a different subdomain but sharing the same root domain as Tacticalrmm:
mesh.mydomain,api.mydomain,rmm.mydomainfor Tacticalrmm andmyapp.mydomainfor the other app. The issue is that Tacticalrmm writes the csrftoken in.mydomainconflicting with the other Django application which correctly writes tomyapp.domain. The other application choose, for authentification, the wrong csrftoken (the first one it finds) and thus fails to be recognized. As a workaround, I changed theSESSION_COOKIE_DOMAINandCSRF_COOKIE_DOMAINvariables insettings.pytoNonein order to force Tacticalrmm to writes the csrftoken tormm.mydomain.Expected behavior
If Tacticalrmm needs to do cross-subdomain authentification, to change the name
csrftokento something of its own with CSRF_COOKIE_NAME setting.Best regards