[ http://issues.apache.org/jira/browse/GERONIMO-1474?page=all ]

Paul McMahan updated GERONIMO-1474:
-----------------------------------

    Attachment: GERONIMO-1474.patch

Attaching a patch that will escape any special html chars read from the web, 
derby, and system logs before displaying them in the log viewer portlets. The 
<c:out> jstl tag is used for this purpose, setting the escapeXml attribute to 
true.  The JSTL 1.0 specification for this tag says:

"If escapeXml is true, the following character conversions are applied:

Character            Character Entity Code
<                            &lt;
>                            &gt;
&                           &amp;
'                             &#039;
''                            &#034;


> Cross site scripting vulnerabilites
> -----------------------------------
>
>          Key: GERONIMO-1474
>          URL: http://issues.apache.org/jira/browse/GERONIMO-1474
>      Project: Geronimo
>         Type: Bug
>   Components: console, security
>     Versions: 1.0
>     Reporter: Greg Wilkins
>      Fix For: 1.0.1, 1.1
>  Attachments: GERONIMO-1474.patch
>
> Reported by oliver karow:
> The Web-Access-Log viewer does no filtering for html-/script-tags, and
> therefore allows attacks against the user of the admin-console:
> http://10.10.10.10:8080/jsp-examples/cal/cal2.jsp?time="/><script>alert(document.cookie)</script>
> Also reported:
> The first one is a classical cross-site scripting in the jsp-examples:
> http://10.10.10.10:8080/jsp-examples/cal/cal2.jsp?time="/><script>alert('Gotcha')</script>

-- 
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
   http://issues.apache.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see:
   http://www.atlassian.com/software/jira

Reply via email to