You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@sling.apache.org by "Cris Rockwell (Jira)" <ji...@apache.org> on 2021/09/02 14:16:00 UTC

[jira] [Comment Edited] (SLING-3469) Provide out of the box CSRF protection

    [ https://issues.apache.org/jira/browse/SLING-3469?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17408867#comment-17408867 ] 

Cris Rockwell edited comment on SLING-3469 at 9/2/21, 2:15 PM:
---------------------------------------------------------------

After reviewing a few posts about Adobe Integrated Runtime   
 * [https://tracker.adobe.com/#/view/AIR-2945647]
 * [https://community.adobe.com/t5/air-discussions/htmlloader-and-quot-referer-quot-request-header/td-p/3614351#3841814]

I recommend removing the code above that allows SWF apps (and others) that bypass the ReferrerFilter using the app:// exception.


was (Author: cris):
After reviewing a few posts about Adobe Integrated Runtime * 
[https://tracker.adobe.com/#/view/AIR-2945647]
 * 
[https://community.adobe.com/t5/air-discussions/htmlloader-and-quot-referer-quot-request-header/td-p/3614351#3841814]

I recommend removing the code above that allows SWF apps (and others) that bypass the ReferrerFilter using the app:// exception.

> Provide out of the box CSRF protection
> --------------------------------------
>
>                 Key: SLING-3469
>                 URL: https://issues.apache.org/jira/browse/SLING-3469
>             Project: Sling
>          Issue Type: Improvement
>            Reporter: Raviteja Lokineni
>            Priority: Critical
>
> One such vulnerability can found on the default login form for FormBasedAuthenticationHandler.
> Grails framework has implemented this protection using custom tag library and filters. Ref: http://grails.org/doc/2.2.1/ref/Tags/form.html



--
This message was sent by Atlassian Jira
(v8.3.4#803005)