This is an automated email from the ASF dual-hosted git repository. kusal pushed a commit to branch WW-5407-docs in repository https://gitbox.apache.org/repos/asf/struts-site.git
commit e99d7d05bcf24ee7c2e47a6605eae0124ce97731 Author: Kusal Kithul-Godage <g...@kusal.io> AuthorDate: Fri Apr 12 20:34:58 2024 +1000 WW-5407 WW-5408 Update additional security options section --- source/security/index.md | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/source/security/index.md b/source/security/index.md index ab5c64f8e..2be6cc53f 100644 --- a/source/security/index.md +++ b/source/security/index.md @@ -433,10 +433,16 @@ with other known dangerous classes or packages in your application. We additionally recommend enabling the following options (enabled by default in 7.0). - * `struts.ognl.allowStaticFieldAccess=false` - static methods are always blocked, but static fields can also optionally be blocked - * `struts.disallowProxyMemberAccess=true` - disallow proxied objects from being used in OGNL expressions as they may present a security risk - * `struts.disallowDefaultPackageAccess=true` - disallow access to classes in the default package which should not be used in production - * `struts.ognl.disallowCustomOgnlMap=true` - disallow construction of custom OGNL maps which can be used to bypass the SecurityMemberAccess policy +* `struts.ognl.allowStaticFieldAccess=false` - static field values which aren't a primitive type can be used to access + classes that wouldn't otherwise be accessible +* `struts.disallowProxyObjectAccess=true` - disallow proxied objects from being used in OGNL expressions as these often + represent application beans or database entities which are sensitive +* `struts.disallowDefaultPackageAccess=true` - disallow access to classes in the default package which should not be + used in production +* `struts.ognl.disallowCustomOgnlMap=true` - disallow construction of custom OGNL maps which can be used to bypass the + SecurityMemberAccess policy +* `struts.actionConfig.fallbackToEmptyNamespace=false` - prevent Actions in the empty namespace from being accessed from + alternative endpoints #### Allowlist Capability