AEM Dispatcher handle bypass extension filter
Hi there,
I'm trying to set up our dispatcher, but realize attacker able to bypass the default filter by appending ";%0aJLN.ico" such as some of the endpoints affected like "https://website.com/check.jsp;%0aJLN.ico"
I realize this extension below allow the attacker to go through any extension listed.
"/0041 { /type "allow" /extension '(clientlibs|css|gif|ico|js|png|swf|jpe?g|woff2?)' } ".
Is there a way/fix to handle the bypass and what rule or extension should I use instead?
Any help you could provide would be much appreciated!
Thanks!