Skip to content

SwitchUserFilter vulnerable to CSRF #4183

Closed
@MikeN123

Description

@MikeN123

Summary

It seems the SwitchUserFilter responds to all HTTP methods, making it vulnerable to CSRF attacks.

Actual Behavior

SwitchUserFilter works for all HTTP methods and only needs a username parameter, j_username (3.2) or username (4.x) by default.

Expected Behavior

I think the list of HTTP methods the SwitchUserFilter accepts should be configurable, and limited to POST by default, to let the CsrfFilter do its job.

Version

All, up to 4.2.1.

Metadata

Metadata

Assignees

Labels

in: webAn issue in web modules (web, webmvc)status: backportedAn issue that has been backported to maintenance branchestype: breaks-passivityA change that breaks passivity with the previous releasetype: enhancementA general enhancement

Type

No type

Projects

No projects

Milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions