Skip to content

Commit

Permalink
Update What's New Link
Browse files Browse the repository at this point in the history
Issue gh-9038
  • Loading branch information
jzheaux committed Oct 6, 2020
1 parent 3205671 commit a2aeb95
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -81,7 +81,7 @@ Here's what you'll see in this release:

* Renamed https://github.com/spring-projects/spring-security/issues/8676[whitelist and blacklist to allowlist and blocklist]
* Added https://github.com/spring-projects/spring-security/pull/7052[`RequestRejectedHandler`]
* Strengthened https://github.com/spring-projects/spring-security/pull/8644[`StrictHttpFirewall`]
* Strengthened https://github.com/spring-projects/spring-security/pull/8644[`StrictHttpFirewall`] to <<servlet-httpfirewall-headers-parameters,verify header and parameter names and values>>
* Made https://github.com/spring-projects/spring-security/issues/5438[`SessionRegistry` aware of `SessionIdChangedEvent`]
* Allow https://github.com/spring-projects/spring-security/issues/8402[`AesBytesEncryptor` to be constructed with a real key]
* https://github.com/spring-projects/spring-security/pull/8450[Deprecated OpenID 2.0 support]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -132,6 +132,8 @@ See https://jira.spring.io/browse/SPR-16851[SPR_16851] for an issue requesting t
If you must allow any HTTP method (not recommended), you can use `StrictHttpFirewall.setUnsafeAllowAnyHttpMethod(true)`.
This will disable validation of the HTTP method entirely.

[[servlet-httpfirewall-headers-parameters]]

`StrictHttpFirewall` also checks header names and values and parameter names.
It requires that each character have a defined code point and not be a control character.

Expand Down

0 comments on commit a2aeb95

Please sign in to comment.