Type Exception Report
Message Invalid character found in the request target [/article/3903838/%E6%9D%B1%E4%BA%9E23%E6%A5%AD%E7%B8%BE%EF%BD%9C%E6%9D%B1%E4%BA%9E%E9%8A%80%E8%A1%8C%E5%8E%BB%E5%B9%B4%E5%B0%8D%E9%A6%99%E6%B8%AF%E5%95%86%E6%A5%AD%E6%88%BF%E5%9C%B0%E7%94%A2%E6%92%A5%E5%82%99%E9%80%BE12%E5%84%84%E5%85%83%E3%80%81%E6%8C%89%E5%B9%B4%E5%A2%9E2%E5%80%8D%E3%80%80%E5%B0%8D%E6%96%B0%E4%B8%96%E7%95%8C%E6%95%9E%E5%8F%A3%E4%B8%8D%E5%A4%A7?mtc\u003d20064 ]. The valid characters are defined in RFC 7230 and RFC 3986
Description The server cannot or will not process the request due to something that is perceived to be a client error (e.g., malformed request syntax, invalid request message framing, or deceptive request routing).
Exception
java.lang.IllegalArgumentException: Invalid character found in the request target [/article/3903838/%E6%9D%B1%E4%BA%9E23%E6%A5%AD%E7%B8%BE%EF%BD%9C%E6%9D%B1%E4%BA%9E%E9%8A%80%E8%A1%8C%E5%8E%BB%E5%B9%B4%E5%B0%8D%E9%A6%99%E6%B8%AF%E5%95%86%E6%A5%AD%E6%88%BF%E5%9C%B0%E7%94%A2%E6%92%A5%E5%82%99%E9%80%BE12%E5%84%84%E5%85%83%E3%80%81%E6%8C%89%E5%B9%B4%E5%A2%9E2%E5%80%8D%E3%80%80%E5%B0%8D%E6%96%B0%E4%B8%96%E7%95%8C%E6%95%9E%E5%8F%A3%E4%B8%8D%E5%A4%A7?mtc\u003d20064 ]. The valid characters are defined in RFC 7230 and RFC 3986 org.apache.coyote.http11.Http11InputBuffer.parseRequestLine(Http11InputBuffer.java:482) org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:263) org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:63) org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:928) org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1794) org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:52) org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) java.base/java.lang.Thread.run(Thread.java:833)
Note The full stack trace of the root cause is available in the server logs.