(struts) 01/01: Merge pull request #912 from atlassian-forks/issue/WW-5408-add-option-to-not-fallback-to-empty-namespace-when-unresolved

2024-04-12 Thread kusal
This is an automated email from the ASF dual-hosted git repository.

kusal pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/struts.git

commit 1562e66a89c1ce6a69a2dd8d72897aea252df901
Merge: 0aa2f269f 1d51d00ec
Author: Kusal Kithul-Godage 
AuthorDate: Fri Apr 12 17:58:06 2024 +1000

Merge pull request #912 from 
atlassian-forks/issue/WW-5408-add-option-to-not-fallback-to-empty-namespace-when-unresolved

WW-5408 add option to not fallback to empty namespace when unresolved

 .../com/opensymphony/xwork2/XWorkTestCase.java | 35 ++---
 .../xwork2/config/impl/DefaultConfiguration.java   | 18 ---
 .../java/org/apache/struts2/StrutsConstants.java   |  2 ++
 .../struts2/config/entities/ConstantConfig.java| 10 ++
 .../org/apache/struts2/default.properties  |  3 ++
 .../xwork2/config/ConfigurationTest.java   | 36 ++
 .../apache/struts2/views/jsp/ui/DebugTagTest.java  | 22 +++--
 7 files changed, 99 insertions(+), 27 deletions(-)




(struts) branch master updated (0aa2f269f -> 1562e66a8)

2024-04-12 Thread kusal
This is an automated email from the ASF dual-hosted git repository.

kusal pushed a change to branch master
in repository https://gitbox.apache.org/repos/asf/struts.git


from 0aa2f269f Merge pull request #911 from 
atlassian-forks/issue/WW-5407-extend-SecurityMemberAccess-proxy-detection-to-proxies
 add e2ec11457 WW-5408 add option to not fallback to empty namespace when 
unresolved
 add f9f632757 /WW-5408 rename 
struts.disableActionConfigFallbackToEmptyNamespace to 
struts.actionConfig.fallbackToEmptyNamespace
 add 1d51d00ec WW-5408 add struts.actionConfig.fallbackToEmptyNamespace as 
true in default.properties
 new 1562e66a8 Merge pull request #912 from 
atlassian-forks/issue/WW-5408-add-option-to-not-fallback-to-empty-namespace-when-unresolved

The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .../com/opensymphony/xwork2/XWorkTestCase.java | 35 ++---
 .../xwork2/config/impl/DefaultConfiguration.java   | 18 ---
 .../java/org/apache/struts2/StrutsConstants.java   |  2 ++
 .../struts2/config/entities/ConstantConfig.java| 10 ++
 .../org/apache/struts2/default.properties  |  3 ++
 .../xwork2/config/ConfigurationTest.java   | 36 ++
 .../apache/struts2/views/jsp/ui/DebugTagTest.java  | 22 +++--
 7 files changed, 99 insertions(+), 27 deletions(-)



(struts-site) branch WW-5407-docs created (now e99d7d05b)

2024-04-12 Thread kusal
This is an automated email from the ASF dual-hosted git repository.

kusal pushed a change to branch WW-5407-docs
in repository https://gitbox.apache.org/repos/asf/struts-site.git


  at e99d7d05b WW-5407 WW-5408 Update additional security options section

This branch includes the following new commits:

 new e99d7d05b WW-5407 WW-5408 Update additional security options section

The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.




(struts-site) 01/01: WW-5407 WW-5408 Update additional security options section

2024-04-12 Thread kusal
This is an automated email from the ASF dual-hosted git repository.

kusal pushed a commit to branch WW-5407-docs
in repository https://gitbox.apache.org/repos/asf/struts-site.git

commit e99d7d05bcf24ee7c2e47a6605eae0124ce97731
Author: Kusal Kithul-Godage 
AuthorDate: Fri Apr 12 20:34:58 2024 +1000

WW-5407 WW-5408 Update additional security options section
---
 source/security/index.md | 14 ++
 1 file changed, 10 insertions(+), 4 deletions(-)

diff --git a/source/security/index.md b/source/security/index.md
index ab5c64f8e..2be6cc53f 100644
--- a/source/security/index.md
+++ b/source/security/index.md
@@ -433,10 +433,16 @@ with other known dangerous classes or packages in your 
application.
 
 We additionally recommend enabling the following options (enabled by default 
in 7.0).
 
- * `struts.ognl.allowStaticFieldAccess=false` - static methods are always 
blocked, but static fields can also optionally be blocked
- * `struts.disallowProxyMemberAccess=true` - disallow proxied objects from 
being used in OGNL expressions as they may present a security risk
- * `struts.disallowDefaultPackageAccess=true` - disallow access to classes in 
the default package which should not be used in production
- * `struts.ognl.disallowCustomOgnlMap=true` - disallow construction of custom 
OGNL maps which can be used to bypass the SecurityMemberAccess policy
+* `struts.ognl.allowStaticFieldAccess=false` - static field values which 
aren't a primitive type can be used to access
+  classes that wouldn't otherwise be accessible
+* `struts.disallowProxyObjectAccess=true` - disallow proxied objects from 
being used in OGNL expressions as these often
+  represent application beans or database entities which are sensitive
+* `struts.disallowDefaultPackageAccess=true` - disallow access to classes in 
the default package which should not be
+  used in production
+* `struts.ognl.disallowCustomOgnlMap=true` - disallow construction of custom 
OGNL maps which can be used to bypass the
+  SecurityMemberAccess policy
+* `struts.actionConfig.fallbackToEmptyNamespace=false` - prevent Actions in 
the empty namespace from being accessed from
+  alternative endpoints
 
  Allowlist Capability
 



(struts-site) branch asf-staging updated: Updates stage by Jenkins

2024-04-12 Thread git-site-role
This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/struts-site.git


The following commit(s) were added to refs/heads/asf-staging by this push:
 new 9eedafb01 Updates stage by Jenkins
9eedafb01 is described below

commit 9eedafb0128608903e1cfbe0928bfe8c43fc2b3b
Author: jenkins 
AuthorDate: Fri Apr 12 10:39:51 2024 +

Updates stage by Jenkins
---
 content/core-developers/default-properties.html |  3 +++
 content/security/index.html | 14 ++
 2 files changed, 13 insertions(+), 4 deletions(-)

diff --git a/content/core-developers/default-properties.html 
b/content/core-developers/default-properties.html
index 82e08be14..11f58ec67 100644
--- a/content/core-developers/default-properties.html
+++ b/content/core-developers/default-properties.html
@@ -379,6 +379,9 @@ struts.xslt.nocache=false
 ### Whether to always select the namespace to be everything before the last 
slash or not
 struts.mapper.alwaysSelectFullNamespace=false
 
+### Whether to fallback to empty namespace when request namespace does not 
match any in configuration
+struts.actionConfig.fallbackToEmptyNamespace=true
+
 ### Whether to allow static field access in OGNL expressions or not
 struts.ognl.allowStaticFieldAccess=true
 
diff --git a/content/security/index.html b/content/security/index.html
index edb42891b..2f6061c83 100644
--- a/content/security/index.html
+++ b/content/security/index.html
@@ -608,10 +608,16 @@ with other known dangerous classes or packages in your 
application.
 We additionally recommend enabling the following options (enabled by 
default in 7.0).
 
 
-  struts.ognl.allowStaticFieldAccess=false - static 
methods are always blocked, but static fields can also optionally be 
blocked
-  struts.disallowProxyMemberAccess=true - disallow 
proxied objects from being used in OGNL expressions as they may present a 
security risk
-  struts.disallowDefaultPackageAccess=true - disallow 
access to classes in the default package which should not be used in 
production
-  struts.ognl.disallowCustomOgnlMap=true - disallow 
construction of custom OGNL maps which can be used to bypass the 
SecurityMemberAccess policy
+  struts.ognl.allowStaticFieldAccess=false - static 
field values which aren’t a primitive type can be used to access
+classes that wouldn’t otherwise be accessible
+  struts.disallowProxyObjectAccess=true - disallow 
proxied objects from being used in OGNL expressions as these often
+represent application beans or database entities which are sensitive
+  struts.disallowDefaultPackageAccess=true - disallow 
access to classes in the default package which should not be
+used in production
+  struts.ognl.disallowCustomOgnlMap=true - disallow 
construction of custom OGNL maps which can be used to bypass the
+SecurityMemberAccess policy
+  struts.actionConfig.fallbackToEmptyNamespace=false - 
prevent Actions in the empty namespace from being accessed from
+alternative endpoints
 
 
 Allowlist Capability