Skip to main content

This content has been archived and is no longer being updated. Links may not function; however, this content may be relevant to outdated versions of the product.

Support Article

CSRFAttack observed in logs



After upgrading from PRPC 6 to Pega 7.1.7, the log generates CSRFAttack warning

Error Messages

2015-07-02 08:02:47,851 | WARN | WebContainer : 2 | mgmt.util.URLAccessContext | Msg: URLAccessModeWarn:URLAccessPermitted URLAccessDetail CSRFAttack Invalid harness ID HID821A4B556A3FBBA95E79DE6B1188E97E :From @baseclass.pzUpdateClipboardModels

Steps to Reproduce

Upgrade from PRPC 6 to Pega 7.1.7 with an application that uses RedirectAndRun.

Root Cause

The root cause of this problem is a backward compatibility defect in Pegasystems’ code/rules.  A new parameter was added to RedirectAndRun that should be specified in any custom code.


This issue is resolved through the following local-change:

Pass the "action" parameter to RedirectAndRun with a value of openAssignment, openWorkItem, openWorkByHandle or displayOnPage.

Published August 14, 2015 - Updated October 8, 2020

Was this useful?

0% found this useful

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega Community has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice
Contact us