Uploaded image for project: 'Tapestry 5'
  1. Tapestry 5
  2. TAP5-1442

XSS vulnerability in calendar component

    Details

    • Type: Bug
    • Status: Closed
    • Priority: Major
    • Resolution: Fixed
    • Affects Version/s: 5.2.4
    • Fix Version/s: 5.3
    • Component/s: tapestry-core
    • Labels:
      None

      Description

      All the XSS Vulnerabiliy (described here : https://issues.apache.org/jira/browse/TAP5-1057) is not solved.

      When we use a Software like Paros, we can change the value of Ajax Request parameters.

      We can run javascript code.

      I did a patch this morning. I just added the escapeHTML function in both of the errorHandler methods.

      Emmanuel

        Attachments

        1. datefield_js.patch
          0.9 kB
          Emmanuel DEMEY
        2. datefield_5_2_4_xss_fix.js
          4 kB
          Emmanuel DEMEY

          Activity

            People

            • Assignee:
              hlship Howard M. Lewis Ship
              Reporter:
              gillespie59 Emmanuel DEMEY
            • Votes:
              6 Vote for this issue
              Watchers:
              2 Start watching this issue

              Dates

              • Created:
                Updated:
                Resolved: