Fix security vulnerability in jsp-examples
------------------------------------------

         Key: GERONIMO-1540
         URL: http://issues.apache.org/jira/browse/GERONIMO-1540
     Project: Geronimo
        Type: Bug
    Reporter: Dave Colasurdo


Oliver Karow has reported a cross-site scripting vulnerability in the Tomcat 
jsp-examples that are included in Geronimo.  It fails on both Jetty and Tomcat.

This can be reproduced with the following urls:

http://localhost:8080/jsp-examples/cal/cal2.jsp?time="/><script>alert('Gotcha')</script>
http://localhost:8080/jsp-examples/cal/cal2.jsp?time="/><script>alert(document.cookie)</script>

This JIRA does not address a related problem in the admin console.  That 
problem is addressed in GERONIMO-1474.
 

-- 
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators:
   http://issues.apache.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see:
   http://www.atlassian.com/software/jira

Reply via email to