[
https://issues.apache.org/jira/browse/CXF-5017?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Sergey Beryozkin resolved CXF-5017.
-----------------------------------
Resolution: Fixed
Fix Version/s: 3.0.0
2.7.6
2.6.9
2.5.11
Assignee: Sergey Beryozkin
> CrossOriginResourceSharingFilter FIELD_COMMA_PATTERN mangles firefox headers
> ----------------------------------------------------------------------------
>
> Key: CXF-5017
> URL: https://issues.apache.org/jira/browse/CXF-5017
> Project: CXF
> Issue Type: Bug
> Components: JAX-RS Security
> Affects Versions: 2.6
> Environment: firefox
> Reporter: Pieter Goddijn
> Assignee: Sergey Beryozkin
> Priority: Minor
> Fix For: 2.5.11, 2.6.9, 2.7.6, 3.0.0
>
>
> When a CORS request header send with a comma delimited list of values without
> whitespace, the regexp:
> {private static final Pattern FIELD_COMMA_PATTERN = Pattern.compile(",\\w*");}
> consumes (part of) the next item in the list.
> The offending header in my case is (on a HTTP OPTIONS pre-flight check)
> Access-Control-Request-Headers: authorization,content-type
> which is eventually returned to the browser as:
> Access-Control-Allow-Headers: authorization, -type
> The result of which is Firefox refusing the cross-domain POST request
> following this OPTIONS check
> i couldn't find a reason why the {\\w*} part should be part of a comma
> splitting regexp, changing the regexp to
> {"," , ",\\b*" or ",\\s"} fixed the problem for me and would seem more
> logical to me (but i'm not too familiar with the ins and out of CXF)
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira