-
Task
-
Resolution: Done
-
Major
-
None
-
None
-
5
-
False
-
None
-
False
-
-
Proposed
-
?
-
---
-
-
SME: sbiarozk
The fix to CVE-2022-4714 required the introduction of stricter filtering rules for HTTP requests in Cross-origin resource sharing (CORS).
Quoting the explanation of the impact of this change on user experience from Sergey's email:
Vert.x HTTP CORS Filter is now extra strict and denies same Origin requests if the browser has decided to include Origin and the filter has not been told explicitly to accept such same host Origin. The browser should not be even adding Origin for the same Origin requests, but looks like it does so for non-idempotent methods like POST.
We need to document how to add the Origin domain to the application configuration, so that the CORS request filter does not block requests made form the origin domain in certain use cases.
For a more detailed explanation, please reach out to Sergey.