Uploaded image for project: 'Geronimo'
  1. Geronimo
  2. GERONIMO-1540

Fix security vulnerability in jsp-examples

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Resolved
    • Major
    • Resolution: Fixed
    • 1.1, 1.2
    • 1.1, 1.2
    • sample apps
    • Security Level: public (Regular issues)
    • None
    • Patch Available

    Description

      Oliver Karow has reported a cross-site scripting vulnerability in the Tomcat jsp-examples that are included in Geronimo. It fails on both Jetty and Tomcat.

      This can be reproduced with the following urls:

      http://localhost:8080/jsp-examples/cal/cal2.jsp?time="/><script>alert('Gotcha')</script>
      http://localhost:8080/jsp-examples/cal/cal2.jsp?time="/><script>alert(document.cookie)</script>

      This JIRA does not address a related problem in the admin console. That problem is addressed in GERONIMO-1474.

      Attachments

        1. geronimo-jsp-examples-tomcat-5.5.15-plus.war
          648 kB
          Dave Colasurdo
        2. jsp-examples.patch
          3 kB
          Dave Colasurdo
        3. examples-cumulative.patch
          6 kB
          Dave Colasurdo
        4. geronimo-servlet-examples-tomcat-5.5.15.war
          72 kB
          Dave Colasurdo

        Activity

          People

            kevan Kevan Lee Miller
            davecola Dave Colasurdo
            Votes:
            0 Vote for this issue
            Watchers:
            0 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: