rspec/rules/S4502/java/rule.adoc

48 lines
1.3 KiB
Plaintext
Raw Normal View History

include::../description.adoc[]
include::../ask-yourself.adoc[]
include::../recommended.adoc[]
== Sensitive Code Example
https://docs.spring.io/spring-security/site/docs/current/reference/html5/#servlet-csrf[Spring Security] provides by default a protection against CSRF attacks which can be disabled:
----
@EnableWebSecurity
public class WebSecurityConfig extends WebSecurityConfigurerAdapter {
@Override
protected void configure(HttpSecurity http) throws Exception {
2021-01-29 15:53:23 +01:00
http.csrf().disable(); // Sensitive: csrf protection is entirely disabled
// or
http.csrf().ignoringAntMatchers("/route/"); // Sensitive: csrf protection is disabled for specific routes
}
}
----
== Compliant Solution
https://docs.spring.io/spring-security/site/docs/current/reference/html5/#servlet-csrf[Spring Security] CSRF protection is enabled by default, do not disable it:
----
@EnableWebSecurity
public class WebSecurityConfig extends WebSecurityConfigurerAdapter {
@Override
protected void configure(HttpSecurity http) throws Exception {
// http.csrf().disable(); // Compliant
}
}
----
include::../see.adoc[]
ifdef::env-github,rspecator-view[]
'''
== Comments And Links
(visible only on this page)
include::../comments-and-links.adoc[]
endif::env-github,rspecator-view[]