Details
-
Improvement
-
Status: Reopened
-
Minor
-
Resolution: Unresolved
-
None
-
None
-
Operating System: All
Platform: All
Description
If developers putting untrusted data into attribute values using the single quote character ' and StringEscapeUtils.escapeHtml() like:
<input type='text' name='input' value='<%=StringEscapeUtils.escapeHtml(request.getParameter("input"))%>'>
Then, the attacker is able to break out of the HTML attribute context like:
hxxp://example.org/?input=' onfocus='alert(document.cookie);' id='
<input type='text' name='input' value=''onfocus='alert(document.cookie);'id=''>
I think LANG-122 is not truly fixed from this aspect (XSS).
Attachments
Issue Links
- is duplicated by
-
LANG-1042 StringEscapeUtils.escapeHtml() does not escape single quote
- Closed