Details
Description
The changes for JCR-4002 have disabled CSRF checking for POST, and thus leave the remoting servlet open for attacks. This HTML form below:
<form action="http://localhost:8080/server/default/jcr:root/" method="post"> <input type="text" id="name" name="user_name" /> <button type="submit">Send your message</button> </form>
will successfully cross-origin-POST to jackrabbit-standalone.
While fixing this issue, it also became clear that the content-type check failed to take syntax variations into account (upper/lowercase, optional parameters)
Attachments
Attachments
Issue Links
- is broken by
-
JCR-4002 CSRF in Jackrabbit-Webdav using empty content-type (CVE-2016-6801)
- Closed