Class Overview
This exists solely to deal with a security vulnerability in Internet Explorer: JRA-28879
IE can be tricked into parsing a text/html page as a stylesheet if it contains certain characters. Hence, a JIRA page
can be loaded as a stylesheet on an external, malicious site and voila, XSS.
Summary
Public Methods |
void
|
doFilter(HttpServletRequest req, HttpServletResponse resp, FilterChain chain)
|
[Expand]
Inherited Methods |
From class
com.atlassian.core.filters.AbstractHttpFilter
void
|
destroy()
|
final
void
|
doFilter(ServletRequest arg0, ServletResponse arg1, FilterChain arg2)
|
abstract
void
|
doFilter(HttpServletRequest arg0, HttpServletResponse arg1, FilterChain arg2)
|
void
|
init(FilterConfig arg0)
|
|
From class
java.lang.Object
Object
|
clone()
|
boolean
|
equals(Object arg0)
|
void
|
finalize()
|
final
Class<?>
|
getClass()
|
int
|
hashCode()
|
final
void
|
notify()
|
final
void
|
notifyAll()
|
String
|
toString()
|
final
void
|
wait()
|
final
void
|
wait(long arg0, int arg1)
|
final
void
|
wait(long arg0)
|
|
From interface
javax.servlet.Filter
void
|
destroy()
|
void
|
doFilter(ServletRequest arg0, ServletResponse arg1, FilterChain arg2)
|
void
|
init(FilterConfig arg0)
|
|
Public Constructors
public
XContentTypeOptionsNoSniffFilter
()
Public Methods
public
void
doFilter
(HttpServletRequest req, HttpServletResponse resp, FilterChain chain)