Done!
https://issues.apache.org/jira/browse/WICKET-4196
*Gert-Jan Schouten
Java Developer*
On 03/11/11 15:16, Igor Vaynberg wrote:
please create a jira issue.
-igor
On Thu, Nov 3, 2011 at 7:02 AM, Gert-Jan Schouten
wrote:
Hello!
The problem is that a hacker can now post URL's that
hu, Nov 3, 2011 at 2:04 PM, Gert-Jan Schouten
wrote:
Hello all,
When having a Wicket application installed on Tomcat and you call that
application through HTTP, Wicket is protected against HTTP Response
Splitting. However, when you call Tomcat through AJP (for example through an
apache httpd p
ext/plain; charset=UTF-8
Here we have 2 Evil Headers, that could be inserted by hackers by adding
%0d%0a to the get-request.
Is there anything we can do about this? We use mod_jk 1.2.31 on our
httpd server.
Cheers!
Gert-Jan
--
*Gert-Jan Schouten
Java Developer*
f you have any other requirements for my unit
test, please let me know.
Cheers,
*Gert-Jan Schouten
Java Developer*
Roboreus
1 New Oxford Street
London WC1a 1NU
T: +44 (0) 7832916802
E: gert-jan.schou...@roboreus.com
Skype: gert.jan.schouten
On 21/09/11 12:17, Martin Grigorov wrote:
Check what