Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

disable jsp and jspx by default #504

Closed
wants to merge 1 commit into from
Closed

Conversation

k4n5ha0
Copy link

@k4n5ha0 k4n5ha0 commented Apr 14, 2022

jsp and jspx is dangerous. likes spring4shell and others hacker,they use uplaod jsp or write a webshell to disk.
If project need jsp or jspx, they pack web.xml in war with jsp mappings by themself.
secure by default.
thx!

jsp and jspx is dangerous. likes spring4shell and others hacker,they use uplaod jsp or write a webshell to disk.
If project need jsp or jspx, they pack web.xml in war with jsp mappings by themself.
secure by default.
thx!
@markt-asf
Copy link
Contributor

This is a bad idea for so many different reasons. To name a few:

  • "Spring4Shell" allows arbitrary file uploads. All an attacker has to do to bypass this change is to upload a web.xml file that re-enables the mapping
  • It does nothing to help users that want/need to use JSPs.
  • Users that had followed the documented security recommendations and set OS file permissions appropriately would have been protected not only against "Spring4Shell"but against any similar vulnerability as well

@markt-asf markt-asf closed this Apr 14, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
2 participants