Skip to content

Commit

Permalink
Refer to code injections security consideration in allowOriginSubdoma…
Browse files Browse the repository at this point in the history
…in JavaDoc
  • Loading branch information
emlun committed Nov 27, 2023
1 parent 20fddc9 commit fadd7ab
Showing 1 changed file with 8 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -281,6 +281,11 @@ public class RelyingParty {
* If <code>true</code>, the origin matching rule is relaxed to allow any subdomain, of any depth,
* of the values of {@link RelyingPartyBuilder#origins(Set) origins}.
*
* <p>Please see <a
* href="https://www.w3.org/TR/2023/WD-webauthn-3-20230927/#sctn-code-injection">Security
* Considerations: Code injection attacks</a> for discussion of the risks in setting this to
* <code>true</code>.
*
* <p>The default is <code>false</code>.
*
* <p>Examples with <code>origins: ["https://example.org", "https://acme.com:8443"]</code>
Expand Down Expand Up @@ -315,6 +320,9 @@ public class RelyingParty {
* <li><code>https://acme.com</code>
* </ul>
* </ul>
*
* @see <a href="https://www.w3.org/TR/2023/WD-webauthn-3-20230927/#sctn-code-injection">§13.4.8.
* Code injection attacks</a>
*/
@Builder.Default private final boolean allowOriginSubdomain = false;

Expand Down

0 comments on commit fadd7ab

Please sign in to comment.