Fix security vulnerability in jsp-examples ------------------------------------------
Key: GERONIMO-1540 URL: http://issues.apache.org/jira/browse/GERONIMO-1540 Project: Geronimo Type: Bug Reporter: Dave Colasurdo Oliver Karow has reported a cross-site scripting vulnerability in the Tomcat jsp-examples that are included in Geronimo. It fails on both Jetty and Tomcat. This can be reproduced with the following urls: http://localhost:8080/jsp-examples/cal/cal2.jsp?time="/><script>alert('Gotcha')</script> http://localhost:8080/jsp-examples/cal/cal2.jsp?time="/><script>alert(document.cookie)</script> This JIRA does not address a related problem in the admin console. That problem is addressed in GERONIMO-1474. -- This message is automatically generated by JIRA. - If you think it was sent incorrectly contact one of the administrators: http://issues.apache.org/jira/secure/Administrators.jspa - For more information on JIRA, see: http://www.atlassian.com/software/jira