All Downloads are FREE. Search and download functionalities are using the official Maven repository.

io.codemodder.codemods.VerbTamperingCodemod.description.md Maven / Gradle / Ivy

There is a newer version: 0.97.3
Show newest version
The `web.xml` specification offers a way to protect certain parts of your URL space. Unfortunately, it doesn't work the way people think it does, developers who are trying to enhance their security often end up accidentally exposing those parts they were trying to protect.

Consider the following `web.xml`, which is trying to restrict the `/admin/*` space to only those with the `admin` role:
```xml

  
    /admin/*
    GET
    POST
  
  
    admin
  

```

This protection works as expected with one regrettable caveat. Notice that the `GET` and `POST` methods are specifically listed. Developers often specify methods like this because they want to further control what types of methods can access the given resource.

Unfortunately, the logic of the mechanism is surprising. Specifying method(s) means if a user issues another HTTP method besides the ones listed, like in this case, `HEAD`, `PUT`, or even a nonsense verb like `JEFF`, the protection will not be deemed to apply to the given ``, and the requester will be granted unfettered access.

Our change is simple: any place we see `` listed in a ``, we remove it:

```diff
  
    
      admin
    
    
      /admin/*
-     GET
-     POST
    
  
```

Taking out all the `` entries tells the server that this protection must be enforced for all methods, which is almost always the intent of the developer.




© 2015 - 2024 Weber Informatics LLC | Privacy Policy