You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@sling.apache.org by "Cris Rockwell (Jira)" <ji...@apache.org> on 2021/09/02 14:16:00 UTC
[jira] [Comment Edited] (SLING-3469) Provide out of the box CSRF
protection
[ https://issues.apache.org/jira/browse/SLING-3469?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17408867#comment-17408867 ]
Cris Rockwell edited comment on SLING-3469 at 9/2/21, 2:15 PM:
---------------------------------------------------------------
After reviewing a few posts about Adobe Integrated Runtime
* [https://tracker.adobe.com/#/view/AIR-2945647]
* [https://community.adobe.com/t5/air-discussions/htmlloader-and-quot-referer-quot-request-header/td-p/3614351#3841814]
I recommend removing the code above that allows SWF apps (and others) that bypass the ReferrerFilter using the app:// exception.
was (Author: cris):
After reviewing a few posts about Adobe Integrated Runtime *
[https://tracker.adobe.com/#/view/AIR-2945647]
*
[https://community.adobe.com/t5/air-discussions/htmlloader-and-quot-referer-quot-request-header/td-p/3614351#3841814]
I recommend removing the code above that allows SWF apps (and others) that bypass the ReferrerFilter using the app:// exception.
> Provide out of the box CSRF protection
> --------------------------------------
>
> Key: SLING-3469
> URL: https://issues.apache.org/jira/browse/SLING-3469
> Project: Sling
> Issue Type: Improvement
> Reporter: Raviteja Lokineni
> Priority: Critical
>
> One such vulnerability can found on the default login form for FormBasedAuthenticationHandler.
> Grails framework has implemented this protection using custom tag library and filters. Ref: http://grails.org/doc/2.2.1/ref/Tags/form.html
--
This message was sent by Atlassian Jira
(v8.3.4#803005)