Skip to content

Commit 2c1daa1

Browse files
committed
add ref
1 parent 25a36ad commit 2c1daa1

1 file changed

Lines changed: 3 additions & 2 deletions

File tree

src/main/java/eu/righettod/SecurityUtils.java

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1583,7 +1583,7 @@ public static boolean isGZIPCompressedDataSafe(byte[] compressedBytes, long maxC
15831583
} catch (Exception e) {
15841584
isSafe = false;
15851585
}
1586-
1586+
15871587
return isSafe;
15881588
}
15891589

@@ -1595,7 +1595,7 @@ public static boolean isGZIPCompressedDataSafe(byte[] compressedBytes, long maxC
15951595
* <li>Characters: Carriage Return (CR), Linefeed (LF) and Tabulation (TAB).</li>
15961596
* <li>Leading and trailing spaces.</li>
15971597
* <li>Any HTML tags.</li>
1598-
* </ul><br><br>
1598+
* </ul><br>
15991599
* A parameter is also used to limit the maximum length of the sanitized message.
16001600
* To remove any HTML tags, the OWASP project <a href="https://owasp.org/www-project-java-html-sanitizer/">Java HTML Sanitizer</a> is leveraged.<br>
16011601
* I delegated such removal to a dedicated library to prevent missing of edge cases as well as potential bypasses.
@@ -1605,6 +1605,7 @@ public static boolean isGZIPCompressedDataSafe(byte[] compressedBytes, long maxC
16051605
* @return The string message cleaned.
16061606
* @see "https://www.wallarm.com/what/log-forging-attack"
16071607
* @see "https://www.invicti.com/learn/crlf-injection"
1608+
* @see "https://knowledge-base.secureflag.com/vulnerabilities/inadequate_input_validation/log_injection_vulnerability.html"
16081609
* @see "https://capec.mitre.org/data/definitions/93.html"
16091610
* @see "https://codeql.github.com/codeql-query-help/javascript/js-log-injection/"
16101611
* @see "https://owasp.org/www-project-java-html-sanitizer/"

0 commit comments

Comments
 (0)