[ 
https://issues.apache.org/jira/browse/SHIRO-795?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17220122#comment-17220122
 ] 

Brian Demers commented on SHIRO-795:
------------------------------------

IMHO, the "to be even more secure" part is not correct, rewriting is about 
compatibility (not improving security)

 

There are a few things at play here.

1.) as described in that link, putting session info in a URL exposes the id, 
server logs, javascript on page, etc

2.) Session rewriting is defined in section 7.1.3 Servlet Spec, 
[https://javaee.github.io/servlet-spec/downloads/servlet-4.0/servlet-4_0_FINAL.pdf]
 (and thus Shiro does need to support it).

3.) The last release of Shiro added functionality to block common URL escape 
attacks, (semicolons were included in that list). However, we did not update 
the rewrite feature's default settings.  This left the potential for a user 
whoe triggered URL rewriting, to also be blocked on their next request. (This 
change resolves that issue)

 

Does that answer your question?

> Disable session path rewriting by default
> -----------------------------------------
>
>                 Key: SHIRO-795
>                 URL: https://issues.apache.org/jira/browse/SHIRO-795
>             Project: Shiro
>          Issue Type: Improvement
>            Reporter: Brian Demers
>            Priority: Major
>             Fix For: 2.0.0, 1.7.0
>
>
> After the addition of the "Invalid Request Filter", URL session rewriting is 
> disabled.
> {code:java}
> # Enable the configuraiton in the session manager
> sessionManager.sessionIdUrlRewritingEnabled = true
> # and the invalid request filter
> invalidRequest.blockSemicolon = false{code}
>  
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to