[
https://issues.apache.org/jira/browse/JCR-4009?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15452212#comment-15452212
]
Julian Reschke edited comment on JCR-4009 at 9/1/16 2:53 PM:
-------------------------------------------------------------
trunk: [r1758600|http://svn.apache.org/r1758600]
[r1758597|http://svn.apache.org/r1758597]
2.12: [r1758609|http://svn.apache.org/r1758609]
2.10: [r1758761|http://svn.apache.org/r1758761]
2.8: [r1758764|http://svn.apache.org/r1758764]
2.6: [r1758771|http://svn.apache.org/r1758771]
2.4: [r1758791|http://svn.apache.org/r1758791]
was (Author: reschke):
trunk: [r1758600|http://svn.apache.org/r1758600]
[r1758597|http://svn.apache.org/r1758597]
2.12: [r1758609|http://svn.apache.org/r1758609]
2.10: [r1758761|http://svn.apache.org/r1758761]
2.8: [r1758764|http://svn.apache.org/r1758764]
2.6: [r1758771|http://svn.apache.org/r1758771]
> CSRF in Jackrabbit-Webdav
> -------------------------
>
> Key: JCR-4009
> URL: https://issues.apache.org/jira/browse/JCR-4009
> Project: Jackrabbit Content Repository
> Issue Type: Bug
> Components: jackrabbit-webdav
> Affects Versions: 2.4.5, 2.6.5, 2.8.2, 2.10.3, 2.12.3, 2.13.2
> Reporter: Julian Reschke
> Assignee: Julian Reschke
> Priority: Blocker
> Labels: csrf, security, webdav
> Fix For: 2.4.6, 2.6.6, 2.10.4, 2.8.3, 2.12.4, 2.13.3
>
> Attachments: JCR-4009.diff
>
>
> The changes for JCR-4002 have disabled CRFS checking for POST, and thus leave
> the remoting servlet open for attacks. This HTML form below:
> {noformat}
> <form action="http://localhost:8080/server/default/jcr:root/" method="post">
> <input type="text" id="name" name="user_name" />
> <button type="submit">Send your message</button>
> </form>
> {noformat}
> will successfully cross-origin-POST to jackrabbit-standalone.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)