-
Notifications
You must be signed in to change notification settings - Fork 38.5k
Protect against RFD exploits [SPR-13548] #18124
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Labels
in: web
Issues in web modules (web, webmvc, webflux, websocket)
status: backported
An issue that has been backported to maintenance branches
type: enhancement
A general enhancement
Milestone
Comments
This was referenced Jan 11, 2019
Closed
This was referenced May 9, 2022
Closed
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
in: web
Issues in web modules (web, webmvc, webflux, websocket)
status: backported
An issue that has been backported to maintenance branches
type: enhancement
A general enhancement
Uh oh!
There was an error while loading. Please reload this page.
Rossen Stoyanchev opened SPR-13548 and commented
For details and concrete examples of RFD attacks see the RFD paper from Trustwave.
For information specific to Spring MVC see the CVE-2015-5211 security report.
Affects: 3.2.14, 4.1.7, 4.2.1
Issue Links:
@ResponseBody
methods explicitly mapped to ".html" or other extensionsBackported to: 4.1.8, 3.2.15
The text was updated successfully, but these errors were encountered: