This release is a new version of the Portlet API, addressing a Security CVE. We 
are changing one method implementation, 
GenericPortlet.serveResource, to be a no-op out of the box. In 2.0, it provided 
a default implementation that could serve any resource 
in the web application. Having it serve resources without the programmer 
actually implementing the serveResource method was
considered to be a potential security vulnerability.  

From the 2.1.0 Portlet Specification:

------
PLT.2.6 Changes Introduced with Version 2.1.0

Version 2.1.0 is a maintenance release amending the description of Resource 
Serving Dispatching in section PLT.5.4.5.3. 
This change, along with the associated Portlet API version 2.1.0 jar file 
update, closes a potential security vulnerability
associated with Common Vulnerabilities and Exposures ID CVE-2015-1926. 

By default the serveResource method in the GenericPortlet class does nothing.

However, if a portlet initialization parameter with the reserved name

“javax.portlet.automaticResourceDispatching” is set to true, the GenericPortlet 
serveResource method will attempt to forward 
the request to the resource ID set on the URL triggering the resource request. 
If no resource ID is set, the serveResource method does nothing. 
——

Binary Downloads:

https://dist.apache.org/repos/dist/release/portals/portlet-api/binaries/ 
<https://dist.apache.org/repos/dist/release/portals/portlet-api/binaries/>

Source Downloads:

https://dist.apache.org/repos/dist/release/portals/portlet-api/sources/ 
<https://dist.apache.org/repos/dist/release/portals/portlet-api/sources/>

Maven:

<dependency>
  <groupId>org.apache.portals</groupId>
  <artifactId>portlet-api_2.1.0_spec</artifactId>
  <version>1.0</version>
</dependency>

Javadocs:

http://portals.apache.org/portlet-api/portlet-api-2.1.0/ 
<http://portals.apache.org/portlet-api/portlet-api-2.1.0/>

Reply via email to