diff options
Diffstat (limited to 'eaaf-springboot-utils/src/main')
| -rw-r--r-- | eaaf-springboot-utils/src/main/java/at/gv/egiz/eaaf/utils/springboot/utils/DataBinderControllerAdvice.java | 27 | 
1 files changed, 27 insertions, 0 deletions
| diff --git a/eaaf-springboot-utils/src/main/java/at/gv/egiz/eaaf/utils/springboot/utils/DataBinderControllerAdvice.java b/eaaf-springboot-utils/src/main/java/at/gv/egiz/eaaf/utils/springboot/utils/DataBinderControllerAdvice.java new file mode 100644 index 00000000..43f37a59 --- /dev/null +++ b/eaaf-springboot-utils/src/main/java/at/gv/egiz/eaaf/utils/springboot/utils/DataBinderControllerAdvice.java @@ -0,0 +1,27 @@ +package at.gv.egiz.eaaf.utils.springboot.utils; + +import org.springframework.core.annotation.Order; +import org.springframework.validation.DataBinder; +import org.springframework.web.bind.WebDataBinder; +import org.springframework.web.bind.annotation.ControllerAdvice; +import org.springframework.web.bind.annotation.InitBinder; + +@ControllerAdvice +@Order(10000) +public class DataBinderControllerAdvice { + +  /** +   * Set list of form parameters that are disallowed by default. +   *  +   * @param dataBinder Spring {@link DataBinder} implementation +   */ +  @InitBinder +  public void setDisallowedFields(WebDataBinder dataBinder) { +    // This code protects Spring Core from a "Remote Code Execution" attack (dubbed "Spring4Shell"). +    // By applying this mitigation, you prevent the "Class Loader Manipulation attack vector from firing. +    // For more details, see this post: https://www.lunasec.io/docs/blog/spring-rce-vulnerabilities/ +    final String[] denylist = new String[] { "class.*", "Class.*", "*.class.*", "*.Class.*" }; +    dataBinder.setDisallowedFields(denylist); + +  } +} | 
