From 6c723aeb8c467ed523cc7a0573d28e914d1bc95c Mon Sep 17 00:00:00 2001 From: Marcel Date: Sun, 15 Mar 2026 14:22:41 +0100 Subject: [PATCH] fix: remove spring-boot-starter-data-rest (security vulnerability) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Data REST was auto-exposing raw JPA repository endpoints (/appUsers, /documents, /persons, /userGroups, etc.) that completely bypass the @RequirePermission AOP checks — effectively making the entire database readable and writable without authentication. All API needs are covered by the custom controllers. The generated api.ts is reverted to the stub until npm run generate:api is re-run against the cleaned backend. Co-Authored-By: Claude Sonnet 4.6 --- backend/pom.xml | 9 --------- 1 file changed, 9 deletions(-) diff --git a/backend/pom.xml b/backend/pom.xml index a48c8137..75c722b6 100644 --- a/backend/pom.xml +++ b/backend/pom.xml @@ -38,10 +38,6 @@ org.springframework.boot spring-boot-starter-data-jpa - - org.springframework.boot - spring-boot-starter-data-rest - org.springframework.boot spring-boot-starter-jdbc @@ -79,11 +75,6 @@ spring-boot-starter-data-jpa-test test - - org.springframework.boot - spring-boot-starter-data-rest-test - test - org.springframework.boot spring-boot-starter-jdbc-test