Skip to content

Commit fadd7ab

Browse files
committed
Refer to code injections security consideration in allowOriginSubdomain JavaDoc
1 parent 20fddc9 commit fadd7ab

File tree

1 file changed

+8
-0
lines changed

1 file changed

+8
-0
lines changed

webauthn-server-core/src/main/java/com/yubico/webauthn/RelyingParty.java

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -281,6 +281,11 @@ public class RelyingParty {
281281
* If <code>true</code>, the origin matching rule is relaxed to allow any subdomain, of any depth,
282282
* of the values of {@link RelyingPartyBuilder#origins(Set) origins}.
283283
*
284+
* <p>Please see <a
285+
* href="https://www.w3.org/TR/2023/WD-webauthn-3-20230927/#sctn-code-injection">Security
286+
* Considerations: Code injection attacks</a> for discussion of the risks in setting this to
287+
* <code>true</code>.
288+
*
284289
* <p>The default is <code>false</code>.
285290
*
286291
* <p>Examples with <code>origins: ["https://example.org", "https://acme.com:8443"]</code>
@@ -315,6 +320,9 @@ public class RelyingParty {
315320
* <li><code>https://acme.com</code>
316321
* </ul>
317322
* </ul>
323+
*
324+
* @see <a href="https://www.w3.org/TR/2023/WD-webauthn-3-20230927/#sctn-code-injection">§13.4.8.
325+
* Code injection attacks</a>
318326
*/
319327
@Builder.Default private final boolean allowOriginSubdomain = false;
320328

0 commit comments

Comments
 (0)