Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[WIP] Move login-ui.xml to java config, part 2 #3292

Draft
wants to merge 6 commits into
base: develop
Choose a base branch
from

Conversation

Kehrlann
Copy link
Contributor

WIP, do not merge.

@Kehrlann Kehrlann added the DO NOT MERGE Internal Test or WIP, please DO NOT MERGE label Feb 13, 2025
Comment on lines +46 to +52
var originalChain = http
.securityMatcher(
"/forgot_password",
"/forgot_password.do"
)
.authorizeHttpRequests(auth -> auth.anyRequest().permitAll())
.csrf(CsrfConfigurer::disable)

Check failure

Code scanning / CodeQL

Disabled Spring CSRF protection High

CSRF vulnerability due to protection being disabled.
Comment on lines +82 to +85
var originalChain = http
.securityMatcher("/verify_email")
.authorizeHttpRequests(auth -> auth.anyRequest().permitAll())
.csrf(CsrfConfigurer::disable)

Check failure

Code scanning / CodeQL

Disabled Spring CSRF protection High

CSRF vulnerability due to protection being disabled.
Comment on lines +96 to +99
var originalChain = http
.securityMatcher("/verify_user")
.authorizeHttpRequests(auth -> auth.anyRequest().permitAll())
.csrf(CsrfConfigurer::disable)

Check failure

Code scanning / CodeQL

Disabled Spring CSRF protection High

CSRF vulnerability due to protection being disabled.
Comment on lines +110 to +113
var originalChain = http
.securityMatcher("/invitations/accept")
.authorizeHttpRequests(auth -> auth.anyRequest().permitAll())
.csrf(CsrfConfigurer::disable)

Check failure

Code scanning / CodeQL

Disabled Spring CSRF protection High

CSRF vulnerability due to protection being disabled.
Comment on lines +130 to +134
var originalChain = http
.securityMatcher("/saml/idp/SSO/**")
.authorizeHttpRequests(auth -> auth.anyRequest().fullyAuthenticated())
.addFilterBefore(passwordChangeUiRequiredFilter, BasicAuthenticationFilter.class)
.csrf(CsrfConfigurer::disable)

Check failure

Code scanning / CodeQL

Disabled Spring CSRF protection High

CSRF vulnerability due to protection being disabled.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
DO NOT MERGE Internal Test or WIP, please DO NOT MERGE
Projects
Development

Successfully merging this pull request may close these issues.

1 participant