StackHawk
๏ƒ‰

Django CORS Guide: What It Is and How to Enable It

StackHawk   |   Apr 30, 2021

LinkedIn
X (Twitter)
Facebook
Reddit
Subscribe To StackHawk Posts

Django is a Python web framework that allows rapid web application development. Apps developed in Django may need to interact with other applications hosted on different domains (or even just different ports). For these requests to succeed, youโ€™ll need to use cross-origin resource sharing (CORS) in your server.

Luckily, in Django thereโ€™s already a module thatโ€™s easy to install and configure to allow CORS requests and avoid errors. So, if you want to know more about CORS and how to enable it in your Django server, be sure to keep reading.

What Is CORS?

CORS is a mechanism to allow interaction with resources hosted on different domains. For instance, one of the most common scenarios to apply it is with Ajax requests.

In order to illustrate how CORS works, letโ€™s assume you have a web application that lives in domain.com . But, to save user information, the app calls an API hosted in another URLโ€”for example, api.domain.com . So, when a request to save data is sent to api.domain.com , the server evaluates the requests based on its headers and the requestโ€™s source.

If you allow the URL domain.com in the server, it will provide the proper response. If the domain is not allowed, the server provides an error. This information exchange occurs using HTTP headers.

Errors Involving CORS

CORS is a security feature that web clients (browsers) implement that can make requests to a specific server to fail. Some possible server responses may include

  • An unauthorized status (403)

  • An error in a preflight request indicating which URLs can send CORS requests

As a clarification, a preflight request is a petition that browsers send to the server to discover what HTTP methods it accepts in requests. Then, the server can return an error status and a list of CORS-enabled URLs. If the server doesnโ€™t include the domain making the request, the browser wonโ€™t even perform the actual data request.

As a rule of thumb, if youโ€™re dealing with different domains, remember to be on the lookout for CORS issues. Also remember that using a different HTTP protocol or even a different port counts as a different domain. But thereโ€™s no need to worry, as current browsersโ€™ tools are very helpful when diagnosing these issues.

Enabling CORS in Django

Since Django is a web framework, itโ€™s very simple to enable CORS. So, here are the steps you must take to do so.

Install the CORS module :

python -m pip install django-cors-headers

Once thatโ€™s done, enable the module in Django. This is done in the installed apps section. Oh, and donโ€™t forget the trailing comma; otherwise, youโ€™ll get an error.

INSTALLED_APPS = [
...
'corsheaders',
...
]

Next, add the middleware classes to listen in on server responses. Middleware classes hook on Djangoโ€™s request/response processing. You can think of it as a plugin system to modify Djangoโ€™s input or output.

MIDDLEWARE = [
...,
'corsheaders.middleware.CorsMiddleware',
'django.middleware.common.CommonMiddleware',
...,
]
Iโ€™d recommend that you place the class CorsMiddleware
 before any other middleware that can generate responses, such as CommonMiddleware
 . This is because any other class may prevent the module from generating the appropriate CORS headers.

Finally, configure at least one of the required settings and any of the optional settings that youโ€™d like to. Letโ€™s review those settings and the purpose of each in the next sections.

Required Settings

Required settings tell the module how to evaluate a requestโ€™s origin. From there, the module decides, based on the settings you defined, if the origin is valid in order to continue processing the request and to provide a response.

You can set the module to allow requests from specific domains, regular expressions, or all requests. What options you should configure will depend on your back endโ€™s purpose. Sometimes all origins are valid, but in other cases, youโ€™ll need to narrow them to only a few, as shown below.

CORS_ALLOWED_ORIGINS

 CORS_ALLOWED_ORIGINS
 is the list of origins authorized to make requests. For example, below Iโ€™ve specified four origins:
CORS_ALLOWED_ORIGINS = [
"https://domain.com",
"https://api.domain.com",
"http://localhost:8080",
"http://127.0.0.1:9000"
]

CORS_ALLOWED_ORIGIN_REGEXES

 CORS_ALLOWED_ORIGIN_REGEXES
 are regular expressions that match domains that can make requests. This setting is especially useful if you have many domains.
CORS_ALLOWED_ORIGIN_REGEXES = [
r"^https://w+.domain.com$",
]

CORS_ALLOW_ALL_ORIGINS

The CORS_ALLOW_ALL_ORIGINS
 setting accepts only true or false. If true, the server will accept all requests. However, for security purposes, itโ€™s better to use one of the above settings to limit valid request sources.

Optional Parameters

The optional parameters already have default values, which are valid in most situations. But if you need additional fine-grained permissions, these settings are the way to go. With them, you can restrict CORS responses according to URLs. Also, you can allow specific actions (GET
,POST
,PUT
, etc.), specific headers for requests, or even cookies. Letโ€™s review the parameters.

CORS_URLS_REGEX

The CORS_URLS_REGEX
 setting restricts which URLs the server will send CORS headers to. Itโ€™s useful, for example, when you just want to send headers on part of your site. Hereโ€™s an example:CORS_URLS_REGEX = r'^/api/.*$'

CORS_ALLOW_METHODS

The CORS_ALLOW_METHODS
 setting limits what methods are allowed for CORS. These are the default values:
CORS_ALLOW_METHODS = [
'DELETE',
'GET',
'OPTIONS',
'PATCH',
'POST',
'PUT',
]

CORS_ALLOW_HEADERS

 CORS_ALLOW_HEADERS
 is a list of non-standard headers allowed in the request. The default value is below:
CORS_ALLOW_HEADERS = [
'accept',
'accept-encoding',
'authorization',
'content-type',
'dnt',
'origin',
'user-agent',
'x-csrftoken',
'x-requested-with',
]

CORS_EXPOSE_HEADERS

 CORS_EXPOSE_HEADERS
 is a list of headers exposed to the browser. The default is an empty array.

CORS_PREFLIGHT_MAX_AGE

The CORS_PREFLIGHT_MAX_AGE
 setting defines the time in seconds a browser can cache a header response to a preflight request. It defaults to 86,400 seconds (one day).

CORS_ALLOW_CREDENTIALS

 CORS_ALLOW_CREDENTIALS
 is a true or false value. So, its value determines whether the server allows cookies in the cross-site HTTP requests.
Watch a Demo Blog Banner

Final Thoughts

As youโ€™ve seen in this post, CORS is a security feature designed to protect the user from malicious websites. In this case, the protection is to allow only specific domains to perform CORS requests. Thus, back-end servers require the proper configuration to accept such requests.

Nevertheless, this feature sometimes can get in the way during your projectโ€™s development process. To configure a development environment, you need to consider the security restrictions CORS requires. That makes it a bit tricky. But once you configure it correctly, you can forget all about it.

Still, donโ€™t forget to disable it if all your requests will originate from the same domain once you deploy your app in production. Otherwise, make sure you configure it properly to avoid unexpected errors. As I explained above, for Django, this step is very easy to perform.

This post was written by Juan Pablo Macias Gonzalez. Juan is a computer systems engineer with experience in backend, frontend, databases and systems administration.

FEATURED POSTS

What is Software Composition Analysis(SCA)? SCA Scanning Overview and Tooling Guide

Software Composition Analysis, or more commonly SCA, is a kind of testing designed to identify third-party components with known vulnerabilities in your application. SCA addresses supply-chain risk. SCA scanners also report on the licenses for each third-party component to help you manage your companyโ€™s licensing policies. This guide provides an overview of SCA, dives into how it works, and offers some advice for choosing a scanner that best fits your needs. Software composition analysis is also sometimes called dependency scanning or component analysis.

Security Testing for the Modern Dev Team

See how StackHawk makes web application and API security part of software delivery.

Watch a Demo

StackHawk provides DAST & API Security Testing

Get Omdia analystโ€™s point-of-view on StackHawk for DAST.

"*" indicates required fields

More Hawksome Posts

Get Hands-on Experience.
Give Us a Test Drive!

We know you might want to test drive a full version of security software before you talk to us. So, Get It On!