Replies: 4 comments
-
|
Thank @lprimak for opening this discussion. |
Beta Was this translation helpful? Give feedback.
-
|
Do we have any way to verify backwards-compatibility of any changes such as this? How about secure-by-default and ability to disable either URLdecode or special character rejection via a flag to the filter, specified in shiro.ini? |
Beta Was this translation helpful? Give feedback.
-
|
Yes I think the feature flag can be a good option. When I am talking about backward compatibility it's about the behavior with the same ini config file for the user. |
Beta Was this translation helpful? Give feedback.
-
|
It's been a while, but I think making a Library/toolkit/framework like shiro "secure-by-default" is so reasonable, that's good enough for making it a breaking change. At least in the next major version, but maybe earlier. Maybe emit a warning for two versions: "attention, the default behaviour will change and affect you". |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Discussion
Currently, every few weeks, Shiro projects receives a security vulnerability report. All of these reports are very similar in nature, but only slightly vary.
The themes are as follows:
We need to figure out what to do with those reports.
Currently, there isn't even an agreement whether these are or are not a true security issues.
Proposal
Please discuss. Thank you
Beta Was this translation helpful? Give feedback.
All reactions