Commit 996da086 authored by chenkailing's avatar chenkailing Committed by kl

移除 Apache-common-text 包,采用 spring 内置的 HtmlUtils 处理 xss 问题

parent 2dd06717
...@@ -62,11 +62,6 @@ ...@@ -62,11 +62,6 @@
<artifactId>commons-lang3</artifactId> <artifactId>commons-lang3</artifactId>
<version>3.7</version> <version>3.7</version>
</dependency> </dependency>
<dependency>
<groupId>org.apache.commons</groupId>
<artifactId>commons-text</artifactId>
<version>1.9</version>
</dependency>
<!-- REDISSON --> <!-- REDISSON -->
<dependency> <dependency>
<groupId>org.redisson</groupId> <groupId>org.redisson</groupId>
......
...@@ -15,8 +15,9 @@ import org.springframework.web.bind.annotation.RestController; ...@@ -15,8 +15,9 @@ import org.springframework.web.bind.annotation.RestController;
import org.springframework.web.multipart.MultipartFile; import org.springframework.web.multipart.MultipartFile;
import java.io.*; import java.io.*;
import java.nio.charset.StandardCharsets;
import java.util.*; import java.util.*;
import org.apache.commons.text.StringEscapeUtils; import org.springframework.web.util.HtmlUtils;
/** /**
* *
...@@ -39,7 +40,8 @@ public class FileController { ...@@ -39,7 +40,8 @@ public class FileController {
//判断是否为IE浏览器的文件名,IE浏览器下文件名会带有盘符信息 //判断是否为IE浏览器的文件名,IE浏览器下文件名会带有盘符信息
// escaping dangerous characters to prevent XSS // escaping dangerous characters to prevent XSS
fileName = StringEscapeUtils.escapeHtml4(fileName); fileName = HtmlUtils.htmlEscape(fileName, StandardCharsets.UTF_8.name());
// Check for Unix-style path // Check for Unix-style path
int unixSep = fileName.lastIndexOf('/'); int unixSep = fileName.lastIndexOf('/');
// Check for Windows-style path // Check for Windows-style path
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment