@@ -556,3 +556,30 @@ Validator.HtmlValidationAction=throw
556556# This is the default behaviour of ESAPI.
557557#
558558# Validator.HtmlValidationConfigurationFile=antisamy-esapi.xml
559+
560+ # #######################################################################################
561+ # The following methods are now disabled in the default configuration and must
562+ # be explicity enabled. If you try to invoke a method disabled by default, ESAPI
563+ # will thrown a NotConfiguredByDefaultException.
564+ #
565+ # The reason for this varies, but ranges from they are not really suitable for
566+ # enterprise scale to that are only marginally tested (if at all) versus the are
567+ # unsafe for general use, although them may be fine when combined with other
568+ # security-in-depth techiques.
569+ #
570+ # The disabled-by-default methods are:
571+ # org.owasp.esapi.reference.DefaultEncoder.encodeForSQL
572+ # org.owasp.esapi.ESAPI.accessController [FUTURE; will correspond to deprecation notice]
573+ #
574+ # Mote details to explain this may be found in the ESAPI GitHub wiki article at
575+ # https://github.com/ESAPI/esapi-java-legacy/wiki/Reducing-the-ESAPI-Library's-Attack-Surface
576+ # ##########
577+ # The format is a comma-separated list of fully.Qualified.ClassName.methodName;
578+ # all class names must begin with "org.owasp.esapi.".
579+ ESAPI.dangerouslyAllowUnsafeMethods.methodNames =
580+ # ##########
581+ # Normally you would put some text here (that will be logged) that provides some
582+ # justification as to why you have enabled these functions. This can be
583+ # anythuing such as a Jira or ServiceNow ticket number, a security exception
584+ # reference, etc. If it is left empty, it will just like "Justification: none".`
585+ ESAPI.enableLegCannonModeAndGetMyAssFired.justification =
0 commit comments