[ 
https://issues.apache.org/jira/browse/SLING-3469?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17408867#comment-17408867
 ] 

Cris Rockwell commented on SLING-3469:
--------------------------------------

After reviewing a few posts about Adobe Integrated Runtime * 
[https://tracker.adobe.com/#/view/AIR-2945647]
 * 
[https://community.adobe.com/t5/air-discussions/htmlloader-and-quot-referer-quot-request-header/td-p/3614351#3841814]

I recommend removing the code above that allows SWF apps (and others) that 
bypass the ReferrerFilter using the app:// exception.

> Provide out of the box CSRF protection
> --------------------------------------
>
>                 Key: SLING-3469
>                 URL: https://issues.apache.org/jira/browse/SLING-3469
>             Project: Sling
>          Issue Type: Improvement
>            Reporter: Raviteja Lokineni
>            Priority: Critical
>
> One such vulnerability can found on the default login form for 
> FormBasedAuthenticationHandler.
> Grails framework has implemented this protection using custom tag library and 
> filters. Ref: http://grails.org/doc/2.2.1/ref/Tags/form.html



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to