[
https://issues.apache.org/jira/browse/SOLR-1594?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12781522#action_12781522
]
Bill Au commented on SOLR-1594:
-------------------------------
I just tried it and Jetty does double-escape:
org.apache.lucene.queryParser.ParseException: Cannot parse
'"<script>alert("xss")</script>': Lexical error at
line 1, column 31. Encountered: <EOF> after :
"\")</script>"
So should we leave it up to the appserver to do the right thing or should Solr
be more proactive? To me double-escaping is a lesser evil than being
vulnerable to xss attack.
> SolrDispatchFilter needs to sanitize exception message
> ------------------------------------------------------
>
> Key: SOLR-1594
> URL: https://issues.apache.org/jira/browse/SOLR-1594
> Project: Solr
> Issue Type: Bug
> Affects Versions: 1.4
> Reporter: Bill Au
> Assignee: Bill Au
> Fix For: 1.5
>
> Attachments: solr-1594.patch
>
>
> SolrDispatchFIlter needs to sanitize exception messages before using them in
> the response. I will attach a patch shortly.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.