Java: minor qhelp update

This commit is contained in:
Jami Cogswell
2025-01-29 22:21:48 -05:00
parent 530103e2d9
commit 577152e20f
3 changed files with 7 additions and 8 deletions

View File

@@ -11,10 +11,9 @@ result in exposure of data or unintended code execution.</p>
<recommendation>
<p>Make sure any requests that change application state are protected from Cross Site Request Forgery (CSRF).
Some application frameworks provide default CSRF protection for unsafe HTTP request methods (<code>POST</code>,
<code>PUT</code>, <code>DELETE</code>, <code>PATCH</code>, <code>CONNECT</code>) which may change the state of
the application. Safe HTTP request methods (<code>GET</code>, <code>HEAD</code>, <code>OPTIONS</code>,
<code>TRACE</code>) should be read-only and should not be used for actions that change application state.</p>
Some application frameworks provide default CSRF protection for unsafe HTTP request methods (such as
<code>POST</code>) which may change the state of the application. Safe HTTP request methods (such as
<code>GET</code>) should be read-only and should not be used for actions that change application state.</p>
<p>This query currently supports the Spring and Stapler web frameworks. Spring provides default CSRF protection
for all unsafe HTTP methods. Stapler provides default CSRF protection for the <code>POST</code> method.</p>

View File

@@ -7,6 +7,6 @@ public HttpRedirect doTransfer() {
}
// BAD - no HTTP request type is specified, so safe HTTP requests are allowed
public HttpRedirect doDelete() {
return delete();
public HttpRedirect doPost() {
return post();
}

View File

@@ -8,6 +8,6 @@ public HttpRedirect doTransfer() {
// GOOD - use POST
@POST
public HttpRedirect doDelete() {
return delete();
public HttpRedirect doPost() {
return post();
}